Quantcast
Channel: Zammad - Community - Latest posts
Viewing all articles
Browse latest Browse all 6743

CSP script-src unsafe-eval should be removed from headers

$
0
0

Title: CSP script-src unsafe-eval should be removed from headers

  1. What is your original issue/pain point you want to solve? Our security team pointed out that this CSP configuration is present in the HTTP headers, and it is detected as a possible security risk from many security scan softwares
  2. Which are one or two concrete situations where this problem hurts the most? The internal security team is bugging us periodically whenever a new security scan looks at our zammad instance
  3. Why is it not solvable with the Zammad standard? The header is needed for correct operation of zammad UI, and cannot be removed without impacts on the software
  4. What is your expectation/what do you want to achieve? Rework the UI code in order to not need eval() and remove the allow-unsafe CSP

Viewing all articles
Browse latest Browse all 6743

Trending Articles