Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSP Violation Reports for redirects should include full original URI and origins in the redirect URIs #86

Closed
devd opened this issue May 17, 2016 · 4 comments
Milestone

Comments

@devd
Copy link

devd commented May 17, 2016

No description provided.

@mikewest
Copy link
Member

mikewest commented Sep 7, 2016

Sorry, I missed this too. (You'll be seeing that a lot, I think, since TPAC is a nice forcing-function to make me realize that I've done a bad job staying on top of things here...)

The reporting changes were meant to make it less likely that we leak information that the page doesn't itself have access to. We can prevent explicitly leaking the origin of a redirect target, so why shouldn't we?

@mikewest mikewest added this to the CSP3 CR milestone Sep 7, 2016
@devd
Copy link
Author

devd commented Sep 7, 2016

not sure what you mean: I was saying if <iframe src="allowdsite.com/foobar"> redirects to notallowed.com/bar, then I should at least know that the violation was caused by allowedsite.com/foobar?

@mikewest
Copy link
Member

mikewest commented Sep 7, 2016

Yeah, if <iframe src="allowdsite.com/foobar"> redirects to disallowed.com, then you should get a report that says child-src was violated by a request to allowedsite.com/foobar. I think that's what the spec says today.

@andypaicu
Copy link
Collaborator

I believe the spec now covers this indeed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants