data: Used in a Content Security Policy (CSP) Directive

Severity: Information
Summary#

Invicti detected data: use in a CSP directive.

Impact#

An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully by using data: protocol.

Remediation#

Remove data: sources from your CSP directives.

Classifications#

Build your resistance to threats. And save hundreds of hours each month.

Get a demo See how it works