Summary
Acunetix 360 detected that one of following CSP directives is used:
- unsafe-eval
- unsafe-inline
By using unsafe-eval
, you allow the use of string evaluation functions like eval
.
By using unsafe-inline
, you allow the execution of inline scripts, which almost defeats the purpose of CSP. When this is allowed, it's very easy to successfully exploit a Cross-site Scripting vulnerability on your website.
Impact
An attacker can bypass CSP and exploit a Cross-site Scripting vulnerability successfully.
Remediation
If possible remove unsafe-eval
and unsafe-inline
from your CSP directives.