[ 
https://issues.apache.org/jira/browse/WICKET-6703?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16939162#comment-16939162
 ] 

Sven Meier commented on WICKET-6703:
------------------------------------

[~Kondratev] Good to have this as a separate issue now.

Some question (not to Andrew alone)
 * is this really more secure? I fail to see how adding dynamic JS to the 
header is different from evaluating it directly.
 * or is this change at least valuable for Wicket's security advertisement?
 * any downsides? do we accept the performance impact? ([~Kondratev]  could you 
add your findings here again?)
 * how urgent is this? do we want to add this to Wicket 9?

> Eliminate window.eval from wicket-ajax-jquery
> ---------------------------------------------
>
>                 Key: WICKET-6703
>                 URL: https://issues.apache.org/jira/browse/WICKET-6703
>             Project: Wicket
>          Issue Type: Improvement
>          Components: wicket-core
>            Reporter: Andrew Kondratev
>            Priority: Major
>
> It's impossible to configure wicket with strict CSP Policy without 
> unsafe-eval and keep using AJAX, because most of AJAX responses contain 
> evaluations and header contributions which cause window.eval to be called. 
> Window eval can be replaced with DOMEval with nonce approach. DOM eval is 
> available in jQuery as globalEval.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to