Selaa lähdekoodia

Employ a stricter Content Security Policy on remote.php

Items sent by remote.php have not to be interpreted by browsers in any way.
tags/v9.1.0beta1
Lukas Reschke 8 vuotta sitten
vanhempi
commit
0cba1ba7f9
No account linked to committer's email address
2 muutettua tiedostoa jossa 7 lisäystä ja 2 poistoa
  1. 2
    2
      build/integration/features/webdav-related.feature
  2. 5
    0
      remote.php

+ 2
- 2
build/integration/features/webdav-related.feature Näytä tiedosto

@@ -74,7 +74,7 @@ Feature: webdav-related
When Downloading file "/welcome.txt"
Then The following headers should be set
|Content-Disposition|attachment|
|Content-Security-Policy|default-src 'self'; script-src 'self' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *|
|Content-Security-Policy|default-src 'none';|
|X-Content-Type-Options |nosniff|
|X-Download-Options|noopen|
|X-Frame-Options|Sameorigin|
@@ -89,7 +89,7 @@ Feature: webdav-related
When Downloading file "/welcome.txt"
Then The following headers should be set
|Content-Disposition|attachment|
|Content-Security-Policy|default-src 'self'; script-src 'self' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *|
|Content-Security-Policy|default-src 'none';|
|X-Content-Type-Options |nosniff|
|X-Download-Options|noopen|
|X-Frame-Options|Sameorigin|

+ 5
- 0
remote.php Näytä tiedosto

@@ -108,6 +108,11 @@ function resolveService($service) {
try {
require_once 'lib/base.php';

// All resources served via the DAV endpoint should have the strictest possible
// policy. Exempted from this is the SabreDAV browser plugin which overwrites
// this policy with a softer one if debug mode is enabled.
header("Content-Security-Policy: default-src 'none';");

if (\OCP\Util::needUpgrade()) {
// since the behavior of apps or remotes are unpredictable during
// an upgrade, return a 503 directly

Loading…
Peruuta
Tallenna