Skip to content
This repository has been archived by the owner on Nov 4, 2024. It is now read-only.

Incorrect CSP analysis of eval() #240

Open
shaialon opened this issue Jan 22, 2021 · 0 comments
Open

Incorrect CSP analysis of eval() #240

shaialon opened this issue Jan 22, 2021 · 0 comments

Comments

@shaialon
Copy link

The Term Blocks execution of JavaScript's eval() function by not allowing 'unsafe-eval' inside script-src has flawed logic in the implementation - Passes the test even when there is no script-src defined...

Example:
https://observatory.mozilla.org/analyze/stackoverflow.com
CSP does not limit scripts: upgrade-insecure-requests; frame-ancestors 'self' https://stackexchange.com, yet the test is passed:
image

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant