Summary

Netsparker detected that one of following CSP directives is used:

  • unsafe-eval
  • unsafe-inline

By using unsafe-eval, you allow the use of string evaluation functions like eval.

By using unsafe-inline, you allow the execution of inline scripts, which almost defeats the purpose of CSP. When this is allowed, it's very easy to successfully exploit a Cross-site Scripting vulnerability on your website.

Impact

An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully.

Remediation

If possible remove unsafe-eval and unsafe-inline from your CSP directives.

Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

Select Category

OR

Search Vulnerability

;
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO