Skip to content

Library is breaking if I don't use 'unsafe-inline' in CSP #313

@rishabh-jain389

Description

@rishabh-jain389

Hi Team,

We are using open-f2 to build micro front-end apps for our customers. Recently we had Penetration testing for the security of the app and the security team found that we are using 'unsafe-inline' CSP which is unsafe for the security of the security purpose. If we remove 'unsafe-inline' then open-f2 logging error on the console.

According to the security Team,
• script-src 'unsafe-inline' - Inline JavaScript code, commonly used in XSS attacks, is
allowed.
• script-src 'unsafe-eval' - Potentially dangerous JavaScript functions, such as eval(),
Function(), and setTimeout() are allowed.

Remediation they have provided
• we recommend redefining a more secure content security policy for the
application as part of a defense-in-depth strategy.
• Where possible, depreciate and remove all inline JavaScript code and use of 'data:' URIs.
• Update the application's 'Content-Security-Policy' directives to reflect this change by
removing these values.
• Establish a restrictive 'default-src' using "Content-Security-Policy: default-src 'self'" and then
open it up only where needed using the content-specific directives (e.g. script-src, objectsrc).

See the below error in the console
image

Please update library 1.4.5 by removing or updating unsafe inlines.

Libraray Version : 1.4.5
React Version : 16

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions