Task #63712
closed
Avoid use of eval() and replace it
Added by Job Rutgers almost 10 years ago.
Updated about 7 years ago.
Estimated time:
(Total: 0.00 h)
Description
The use of the eval() can be slow and insecure, so maybe it's better to avoid and replace it.
More info on:
http://www.nczonline.net/blog/2013/06/25/eval-isnt-evil-just-misunderstood/
After it is implemented it should be possible to use (in nginx):
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; frame-ancestors 'self'";
Now 'unsafe-eval' still needed in default-src
- Target version changed from 7.0 to 7.1 (Cleanup)
- Target version changed from 7.1 (Cleanup) to 7.4 (Backend)
- Target version changed from 7.4 (Backend) to 7.5
- Target version changed from 7.5 to 7 LTS
- Status changed from New to Resolved
just a few remaining evals, but all in JavaScript-code. Let's imho close it
There is still (7.6) CSP Issues in the backend (/typo3).
We should add a fitting CSP to the .htaccess in /typo3. Currently I am adding
Header set Content-Security-Policy "default-src * 'unsafe-eval' 'unsafe-inline';
in /typo3/.htaccess to overrule the more strict CSP of the website itself and make the backend work as well.
It would be a nice security feature if the TYPO3 backend would support a stricter CSP.
Infos on CSP:
http://content-security-policy.com/
https://de.wikipedia.org/wiki/Content_Security_Policy
- Status changed from Resolved to Closed
Also available in: Atom
PDF