- From: Michal Zalewski <lcamtuf@coredump.cx>
- Date: Wed, 2 May 2012 09:32:07 -0700
- To: Tanvi Vyas <tanvi@mozilla.com>
- Cc: public-webappsec@w3.org
> document.enforceSecurityPolicy("default-src 'self' "); Also note that given the behavior of certain XSS filters that make it possible to selectively disable some of the <script> blocks (but not others), this seems undesirable. Frankly, I don't see any truly compelling reasons for dropping <meta>; CSP is far from being perfect, and has several far more concerning bypass vectors; but it's better than nothing. Making it harder to deploy it in a common use case just to prevent an attack in a far more peripheral one (which can be readily turned into XSS in some browsers anyway) seems odd. /mz
Received on Wednesday, 2 May 2012 16:33:01 UTC