Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

default-src can break directives from other headers #9

Open
bigbangx opened this issue Mar 27, 2025 · 4 comments
Open

default-src can break directives from other headers #9

bigbangx opened this issue Mar 27, 2025 · 4 comments
Assignees

Comments

@bigbangx
Copy link

Hello,

with split headers it seems impossible to load something that is not declared in default-src too, right ?

Here is an example (intentionally split with short headers, but assume it's legitimately split):

Content-Security-Policy: "default-src 'self';"
Content-Security-Policy: "img-src 'self' www.anotherwebsite.com;"

With this, I want to be able to load images from www.anotherwebsite.com, but not scripts for example.

However, as default-src is defined, when first header is evaluated, it matches and it's more restrictive than second header, so image from anotherwebsite.com will not load.

How should we manage this kind of cases ?
Force undeclared directives with default-src value and remove default-src directive ?

@mfickers
Copy link
Member

For our projects our setup contains a Varnish reverse proxy that concatenates the CSP headers again. So we use this extension to split the headers to bypass the hard size limit of Apache, but the browser receives a single large header.

If more than one CSP header is evaluated by the browser, then additional headers can only further restrict the policy. If your default-src contains only 'self', then additional headers can not allow external resources. This is explained in detail here.

Possible solutions are:

  • Make your default-src as lenient as needed, for example by using a wildcard
  • Omit the default-src completely

I don't see an easy way of handling this automatically without the risk of allowing unwanted connections. We should definitely include a warning about this behavior in the documentation.

@bigbangx
Copy link
Author

bigbangx commented Mar 28, 2025

Maybe one option would be to regenerate default-src by combining all others, but it could easily lead to header overflow again.
(and allow unwanted connections to undeclared directives)

@bigbangx
Copy link
Author

@mfickers
Do you see any problem with replacing default-src by all missing directives?

i.e. replacing:

Content-Security-Policy: "default-src 'self';"
Content-Security-Policy: "img-src 'self' www.anotherwebsite.com;"

by something like

Content-Security-Policy: "script-src 'self'; style-src 'self'; font-src 'self'; object-src 'self'; media-src 'self'; "
Content-Security-Policy: "img-src 'self' www.anotherwebsite.com;"
Content-Security-Policy: "media-src 'self'; frame-src 'self'; worker-src 'self'; manifest-src 'self';"

(I maybe missed some directives in the list, but you got the idea)

@mfickers
Copy link
Member

That should work and would not add too much additional overhead in most cases. Good solution 👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

2 participants