Netsparker detected data: use in a CSP directive.
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data: protocol.
Remove data: sources from your CSP directives.
You can search and find all vulnerabilities
Dead accurate, fast & easy-to-use Web Application Security Scanner
Netsparker Ltd 220 Industrial Blvd Ste 102Austin, TX 78745
© Netsparker 2021, by Invicti