Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: FORMS-935 CSP Header Implementation #1588

Closed

Conversation

revanth-banala
Copy link
Collaborator

Description

The OWASP Zap Scan process has identified a Medium risk level vulnerability:

Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.

To satisfy the requirements outlined in the Security Threat and Risk Assessment's (STRA) Statement of Acceptable Risks (SoAR), this vulnerability must be remediated.

Tasks
Learn what this means: how does the CSP work? Is it backend, frontend, both?

Learn what the potential impacts will be to users

Create a fix that addresses the problem

Bonus points: the fix addresses other CSP vulnerabilities in the report

Acceptance Criteria
The fix does not adversely affect users

The vulnerability stops appearing in the OWASP ZAP Scan report

Type of Change

fix (a bug fix)

Checklist

  • I have read the CONTRIBUTING doc
  • I have checked that unit tests pass locally with my changes
  • I have run the npm script lint on the frontend and backend
  • I have added tests that prove my fix is effective or that my feature works
  • I have added necessary documentation (if appropriate)
  • I have approval from the product owner for the contribution in this pull request

Further comments

@revanth-banala
Copy link
Collaborator Author

This is for Testing
Will do ZAP scan to see whether the vulnerabilities are still coming up..

@revanth-banala revanth-banala deleted the fix/csp-header-implementation branch January 29, 2025 23:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant