You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
Browsers are not requiring Content-Security-Contexts in the browsers header in meta tags or, by default, content is not viewable.
Expected behavior
Cacti should refrain from dependency of eval() within the code, as well as using inline JavaScript.
Inline JavaScript is also problematic to many security professionals and should also be avoided. However, Cacti 1.2.x leverages in inline JavaScript extensively, though evals() are only used in select areas. Therefore, inline JavaScript removal will have to wait for Cacti 1.3 before being extracted.
The text was updated successfully, but these errors were encountered:
netniV
changed the title
Minimuze use of eval() in JavaScript due to emerging Content-Security-Contexts guidelines
Minimize use of eval() in JavaScript due to emerging Content-Security-Contexts guidelines
Jan 17, 2020
TheWitness
changed the title
Minimize use of eval() in JavaScript due to emerging Content-Security-Contexts guidelines
Minimize use of eval() in JavaScript due to emerging Content-Security-Context guidelines
Jan 17, 2020
Describe the bug
Browsers are not requiring Content-Security-Contexts in the browsers header in meta tags or, by default, content is not viewable.
Expected behavior
Cacti should refrain from dependency of eval() within the code, as well as using inline JavaScript.
Inline JavaScript is also problematic to many security professionals and should also be avoided. However, Cacti 1.2.x leverages in inline JavaScript extensively, though evals() are only used in select areas. Therefore, inline JavaScript removal will have to wait for Cacti 1.3 before being extracted.
The text was updated successfully, but these errors were encountered: