- From: Michal Zalewski <lcamtuf@coredump.cx>
- Date: Wed, 2 May 2012 09:32:07 -0700
- To: Tanvi Vyas <tanvi@mozilla.com>
- Cc: public-webappsec@w3.org
> document.enforceSecurityPolicy("default-src 'self' ");
Also note that given the behavior of certain XSS filters that make it
possible to selectively disable some of the <script> blocks (but not
others), this seems undesirable.
Frankly, I don't see any truly compelling reasons for dropping <meta>;
CSP is far from being perfect, and has several far more concerning
bypass vectors; but it's better than nothing. Making it harder to
deploy it in a common use case just to prevent an attack in a far more
peripheral one (which can be readily turned into XSS in some browsers
anyway) seems odd.
/mz
Received on Wednesday, 2 May 2012 16:33:01 UTC