Serge van den Boom wrote on 6/23/2009 8:13 AM: 
> However, by injecting an X-Content-Security-Policy header with the
> policy-uri set to the vulnerable URL, the web client can be tricked into
> visiting the vulnerable URL.

It would only work for those pages where a X-Content-Security-Policy header has 
not already been set -- additional X-Content-Security-Policy headers are 
ignored.  But beyond that, the proposed "Link" header would provide the same 
attack surface, and can not be restricted to a known URI:

        
http://www.ietf.org/internet-drafts/draft-nottingham-http-link-header-05.txt

Given that, I suggest keeping the CSP specification as-is.


- Bil

_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to