111
111
< h1 class ="p-name no-ref " id ="title "> Content Security Policy Level 2</ h1 >
112
112
113
113
< h2 class ="no-num no-toc no-ref heading settled " id ="subtitle "> < span class ="content "> Editor’s Draft,
114
- < time class ="dt-updated " datetime ="2015-08-11 " > 11 August 2015</ time > </ span > </ h2 >
114
+ < time class ="dt-updated " datetime ="2015-08-12 " > 12 August 2015</ time > </ span > </ h2 >
115
115
116
116
< div data-fill-with ="spec-metadata ">
117
117
< dl >
@@ -346,7 +346,7 @@ <h2 class="no-num no-toc no-ref heading settled" id="contents"><span class="cont
346
346
< li > < a href ="#security-considerations "> < span class ="secno "> 9</ span > < span class ="content "> Security Considerations</ span > </ a >
347
347
< ul class ="toc ">
348
348
< li > < a href ="#security-css-parsing "> < span class ="secno "> 9.1</ span > < span class ="content "> Cascading Style Sheet (CSS) Parsing</ span > </ a >
349
- < li > < a href ="#security-violation-reports "> < span class ="secno "> 9.2</ span > < span class ="content "> Violation Reports </ span > </ a >
349
+ < li > < a href ="#security-redirects "> < span class ="secno "> 9.2</ span > < span class ="content "> Redirect Information Leakage </ span > </ a >
350
350
</ ul >
351
351
< li > < a href ="#implementation-considerations "> < span class ="secno "> 10</ span > < span class ="content "> Implementation Considerations</ span > </ a >
352
352
< ul class ="toc ">
@@ -4963,7 +4963,7 @@ <h3 class="heading settled" data-level="9.1" id="security-css-parsing"><span cla
4963
4963
4964
4964
< section >
4965
4965
4966
- < h3 class ="heading settled " data-level ="9.2 " id ="security-violation-reports "> < span class ="secno "> 9.2. </ span > < span class ="content "> Violation Reports </ span > < a class ="self-link " href ="#security-violation-reports "> </ a > </ h3 >
4966
+ < h3 class ="heading settled " data-level ="9.2 " id ="security-redirects "> < span class ="secno "> 9.2. </ span > < span class ="content "> Redirect Information Leakage </ span > < a class ="self-link " href ="#security-redirects "> </ a > </ h3 >
4967
4967
4968
4968
4969
4969
@@ -4980,6 +4980,20 @@ <h3 class="heading settled" data-level="9.2" id="security-violation-reports"><sp
4980
4980
such as session identifiers or purported identities. For this reason, the
4981
4981
user agent includes only the origin of the blocked URL.</ p >
4982
4982
4983
+
4984
+
4985
+ < p > The mitigations are not complete, however: redirects which are blocked will
4986
+ produce side-effects which may be visible to JavaScript (via
4987
+ < code > img.naturalHeight</ code > , for instance). An earlier version of this
4988
+ specification defined a
4989
+ < a href ="http://www.w3.org/TR/2015/CR-CSP2-20150721/#csp-request-header "> < code > CSP</ code >
4990
+ request header</ a > which servers could use (in conjunction with the
4991
+ < code > referer</ code > and < code > origin</ code > headers) to determine whether
4992
+ or not it was completely safe to redirect a user. This header caused some
4993
+ issues with CORS processing (tracked in
4994
+ < a href ="https://github.com/whatwg/fetch/issues/52 "> whatwg/fetch#52</ a > ),
4995
+ and has been punted to the next version of this document.</ p >
4996
+
4983
4997
4984
4998
</ section >
4985
4999
</ section >
0 commit comments