Base solution for your next web application
Open Closed

Content-Security-Policy #12378


User avatar
0
kansoftware created

Hello team,

Without a CSP, attackers can inject malicious scripts into web pages, leading to Cross-Site Scripting (XSS) vulnerabilities. This could allow attackers to steal cookies, session tokens, or perform actions on behalf of users.

So I have added below CSP in head tag of Layout.cshtml

<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self' 'unsafe-inline'; object-src 'none';">

But I am getting so many below errors in console and application also not working fine.

Refused to apply inline style because it violates the following Content Security Policy directive: "default-src 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-jJM8ABruwVX3rGcVNnQ2Dj3dMq5AyDhLGnN8uyg9hBo='), or a nonce ('nonce-...') is required to enable inline execution. Note also that 'style-src' was not explicitly set, so 'default-src' is used as a fallback.

Please let me know if there is any existing functionality for this, or how I can implement it.


1 Answer(s)
  • User Avatar
    0
    oguzhanagir created
    Support Team

    Hi @kansoftware

    Can you change the structure you use as follows? At the same time, can you add the Content Security Policy to Startup.cs as a middleware, it would be safer. When you add this way, the console will not give an error. You need to organize external links and directives according to your own system.

    app.Use(async (context, next) =>
    {
        context.Response.Headers["Content-Security-Policy"] =
            "default-src 'self'; " +
            "script-src 'self' 'unsafe-inline'; " +
            "style-src 'self' 'unsafe-inline'; " +
            "img-src 'self' data:; " +
            "connect-src 'self' ws://localhost:64375 wss://localhost:44380 http://localhost:64375; " +
            "object-src 'none';";
        await next();
    });