Uploaded image for project: 'Project Simple'
  1. Project Simple
  2. ST-127

CONTENT SECURITY POLICY NOT SPECIFIED

    Details

    • Type: Change Request
    • Status: Closed
    • Priority: Medium
    • Resolution: Done
    • Component/s: BenAdmin
    • Labels:
    • Module:
      BenAdmin - Security
    • Reported by:
      Support
    • Item State:
      Production Complete - Closed
    • Issue Importance:
      Must Have
    • Sprint:
      ST Sprint 2

      Description

      Vulnerability Description
      The server does not include a Content-Security-Policy header in HTTP(S) responses.

      Impact
      Content Security Policy is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. To use CSP, the developer writes a set of rules to govern which servers an app can open connections to, limit the types of content it can download from those servers, and restrict the use of dangerous features like inline scripts and the eval function.

      Verification and Attack Information
      Praetorian identified this issue through a manual application walkthrough by reviewing HTTP headers. While doing so, Praetorian noted that Content-Security-Policy header was not included in server response headers.

      Recommendation
      Best practices for web applications suggest that servers should specify a Content Security Policy (CSP) to whitelist the actions that their users' browsers are allowed to take.

      References
      https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
      http://www.html5rocks.com/en/tutorials/security/content-security-policy/

        Attachments

          Activity

          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment - - edited

          Help URL
          https://ole.michelsen.dk/blog/secure-your-website-with-content-security-policy.html
          http://content-security-policy.com/

          HTTP Response Header
          Name : Content-Security-Policy
          Value : default-src 'self' 'unsafe-inline' 'unsafe-eval';

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - - edited Help URL https://ole.michelsen.dk/blog/secure-your-website-with-content-security-policy.html http://content-security-policy.com/ HTTP Response Header Name : Content-Security-Policy Value : default-src 'self' 'unsafe-inline' 'unsafe-eval';
          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment -

          For Testing :
          1. Open Login Page --> Inspect Element --> Network Tab --> Reload Page (Ctrl + F5)
          2. Check Response Headers of all files --> Content-Security-Policy attribute is visible.

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - For Testing : 1. Open Login Page --> Inspect Element --> Network Tab --> Reload Page (Ctrl + F5) 2. Check Response Headers of all files --> Content-Security-Policy attribute is visible.
          Hide
          amitg Amit Gude (Inactive) added a comment -

          Assigning to Zeeshan

          Show
          amitg Amit Gude (Inactive) added a comment - Assigning to Zeeshan
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Content Security Policy is implemented but it can be further fine
          tuned. for example adding script-src, style-src,connect-src directives.

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Content Security Policy is implemented but it can be further fine tuned. for example adding script-src, style-src,connect-src directives.
          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment -

          Earlier value is also fine and secured, if following is the recommendation, then it will be fine.
          Please confirm the following value and inform us.

          Follow value for Content-Security-Policy
          Value : script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; connect-src 'self'

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - Earlier value is also fine and secured, if following is the recommendation, then it will be fine. Please confirm the following value and inform us. Follow value for Content-Security-Policy Value : script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; connect-src 'self'
          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment -

          Recommended settings has been done on LB and Local.

          Response Header : Content-Security-Policy
          Value : script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; connect-src 'self'

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - Recommended settings has been done on LB and Local. Response Header : Content-Security-Policy Value : script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; connect-src 'self'
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Verified the fix implemented

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Verified the fix implemented
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Verified on Stage as the policy is implemented

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Verified on Stage as the policy is implemented
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Hi Rakesh Roy

          Assigning this ticket to you for functional testing.

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Hi Rakesh Roy Assigning this ticket to you for functional testing.
          Hide
          deepalit Deepali Tidke (Inactive) added a comment -

          Kindly check this , for more details discuss with Niteen.

          Show
          deepalit Deepali Tidke (Inactive) added a comment - Kindly check this , for more details discuss with Niteen.
          Hide
          kunal.kedari Kunal Kedari (Inactive) added a comment -

          As discussed with Niteen Surwase functional testing is not needed for this change, hence assigning back to dev team.

          Show
          kunal.kedari Kunal Kedari (Inactive) added a comment - As discussed with Niteen Surwase functional testing is not needed for this change, hence assigning back to dev team.
          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment -

          Hi Rakesh Roy

          As attribute is changed for Newrelic so we will directly deploy it on stage. New relic is not available on Development and Testing environment.

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - Hi Rakesh Roy As attribute is changed for Newrelic so we will directly deploy it on stage. New relic is not available on Development and Testing environment.
          Hide
          kunal.kedari Kunal Kedari (Inactive) added a comment -

          As discussed with Niteen Surwase functional testing is not needed for this change, hence assigning back to dev team.

          Show
          kunal.kedari Kunal Kedari (Inactive) added a comment - As discussed with Niteen Surwase functional testing is not needed for this change, hence assigning back to dev team.

            People

            Assignee:
            prasadp Prasad Pise (Inactive)
            Reporter:
            vijayendra Vijayendra Shinde (Inactive)
            Developer:
            Niteen Surwase (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved:
              Pre-Prod Due Date: