Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow multiple headers when parsing CSP #466

Open
april opened this issue Mar 22, 2022 · 7 comments
Open

Allow multiple headers when parsing CSP #466

april opened this issue Mar 22, 2022 · 7 comments
Assignees

Comments

@april
Copy link
Contributor

april commented Mar 22, 2022

The current code only allows a singular CSP policy, which is technically not correct according to CSP3.

Update the code so that it can handle multiple CSP policies, by combining them together.

@april april self-assigned this Mar 22, 2022
@LootAcademy
Copy link

Hey!
I desperately need your help addressing a findec issue on the 168 string. It seems like the code has exposed the codecKext to the security issues that Tim B. warned about. Trying to get aligned with the CSP3 pol requirements with the M! silicon. What kinds of solutions are you familiar with?

@LootAcademy
Copy link

The current code only allows a singular CSP policy, which is technically not correct according to CSP3.

Update the code so that it can handle multiple CSP policies, by combining them together.

I desperately need your help addressing a findec issue on the 168 string. It seems like the code has exposed the codecKext to the security issues that Tim B. warned about. Trying to get aligned with the CSP3 pol requirements with the M! silicon. What kinds of solutions are you familiar with?

@LootAcademy
Copy link

MDN2

@rw-AntoniRoszak
Copy link

Hello,

I see that after commit a422b3a scanner stopped analyzing the CSP in . Now I get only "none" in all CSPs and page score is incorrect (too high).
Previously, was also analyzed (and this is what a browser does).
I think it may be related to the fact that all entries from get "keep" == False so they are removed by line:
csp[directive] = [source for source in combined_sources if source['keep'] is True]

@april
Copy link
Contributor Author

april commented Nov 14, 2022

For which website? I just tested a few with different CSP configs and they produced the correct result.

@rw-AntoniRoszak
Copy link

@april
Copy link
Contributor Author

april commented Nov 14, 2022 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants