Closed benboeck closed 6 years ago
Hi @benboeck, I just read the documentation from Mozilla. It does not seem to bring a new vulnerability.
http://
to https://
http://
URLI test to see if upgrade-insecure-requests
would be disabled when block-all-mixed-content
is present.
I have done tests in Chrome and Firefox. They will both upgrade HTTP requests regardless of the order of the two directives.
If you have a POC, it would help. Thanks
Hello Philippe, dear GoSecure team,
in a recent test we found the following misconfiguration which could make a good addition to your "CSP Auditor" extension:
upgrade-insecure-requests TOGETHER with block-all-mixed-content:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/upgrade-insecure-requests
From my understanding the severity seems low (misconfiguration) but it could lead to unwanted behavior and who knows about potential browser edge cases.
Kind regards Ben