Content Security Policy Can be bypassed in Chrome?

แชร์
ฝัง
  • เผยแพร่เมื่อ 10 ส.ค. 2020
  • A recent flow now allows attackers to override CSP by doing the following. Chrome fixed it thankfully.
    Resources
    Issue 1064676: full CSP bypass while evaluating a javascript-URL in iframe. (CVE-2020-6519)
    bugs.chromium.org/p/chromium/...
    Learn more about CSP
    developer.mozilla.org/en-US/d...
    My XSS video
    🏭 Backend Engineering Videos
    • Backend Engineering (B...
    💾 Database Engineering Videos
    • Database Engineering
    🛰 Network Engineering Videos
    • Network Engineering
    🏰 Load Balancing and Proxies Videos
    • Proxies
    🐘 Postgres Videos
    • PostgresSQL
    🚢Docker
    • Docker
    🧮 Programming Pattern Videos
    • Programming Patterns
    🛡 Web Security Videos
    • Web Security
    🦠 HTTP Videos
    • HTTP
    🐍 Python Videos
    • Python by Example
    🔆 Javascript Videos
    • Javascript by Example
    👾Discord Server / discord
    Become a Member
    / @hnasr
    Support me on PayPal
    bit.ly/33ENps4
    Become a Patreon
    / hnasr
    Stay Awesome,
    Hussein
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 29

  • @BloodyIron
    @BloodyIron 2 ปีที่แล้ว +1

    This is a legit worthwhile video to watch. Nicely done! Thanks :D

  • @peety1211
    @peety1211 3 ปีที่แล้ว

    As usual your content is great. I find your videos to be easily understandable.

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      prasanna m i am glad to hear that thank you 😊

  • @MehdiShojaei
    @MehdiShojaei 3 ปีที่แล้ว +3

    Hi Hussein, Thanks for your useful content. About 8:40, actually *document.cookie* will evaluate in the context of the main (top) window before appending to the string. So accessing the cookie is not required in the .

    • @hnasr
      @hnasr  3 ปีที่แล้ว +1

      Mahdi Shojaei good catch!!! Exactly that, thanks for correcting me

  • @dudeyouhavenoidea
    @dudeyouhavenoidea 3 ปีที่แล้ว

    Nice one.. learnt alot.

  • @taulantus
    @taulantus 3 ปีที่แล้ว +5

    Hey, Hussein I really love your channel man, always good content.
    Because of you, I decided to work only on the backend.
    I was wondering if you did or planning to do a video on how Nginx handles caching.
    Thank you.

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Taulant Vokshi I am glad that you found what you are passionate about and that the content help 😊
      Yes! NginX is a beast and I barely scratched the surface on it. Caching is on my list

    • @taulantus
      @taulantus 3 ปีที่แล้ว

      @@hnasr Thank You.

  • @artso003
    @artso003 3 ปีที่แล้ว +1

    Great video!

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Artem S thanks Artem!

  • @hakimhassani97
    @hakimhassani97 3 ปีที่แล้ว +1

    quality content, thanks a lot

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      hakim hassani 🙏

  • @domaincontroller
    @domaincontroller 3 ปีที่แล้ว +1

    00:58 what is CSP ? 01:40 if there are images coming from another domain, please do not send get requests to that URL 02:21 you can set it as part as a meta tag 02:25 or as back end engineers, set it as part of the payload headers coming back from the servers
    ------------------------------------------------------
    03:09 the bug
    ------------------------------------------------------

  • @chantapatct
    @chantapatct 3 ปีที่แล้ว

    Thank you for sharing. I was wondering how CSP header works when we have different types of responses(html, json, xml, etc.) in the website, is it enough to set the CSP only for the first html(root) response? or is there any point to set CSP on every response from the server?, for example json data from rest API.

    • @sairam-lj6zu
      @sairam-lj6zu 3 ปีที่แล้ว

      It is enough to set for the HTML/root page.

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Every html page should get its own CSP, so either add it to the meta tag or respond it with headers..

  • @tejasshinde0051
    @tejasshinde0051 3 ปีที่แล้ว

    if it is not set so which vulnerability it is?

  • @kallikantzaros
    @kallikantzaros 2 ปีที่แล้ว

    First time ever heard someone says "Ping file" instead of PNG file xD

  • @suryayoutube2784
    @suryayoutube2784 3 ปีที่แล้ว

    Great info! Thank you, Will it be vulnerable if the CSP set in http header?

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      It should I think

  • @ca7986
    @ca7986 3 ปีที่แล้ว

    ♥️

  • @adityarawat01
    @adityarawat01 3 ปีที่แล้ว

    Can we bypass paid videos like skillcapped videos

  • @yashwanthd1998
    @yashwanthd1998 3 ปีที่แล้ว

    Just subbed after watching a video on mime sniffing..great explanation..but please dont zoom out the code its hard to follow

    • @hnasr
      @hnasr  3 ปีที่แล้ว

      Instantiate will do thanks!

  • @ZelenoJabko
    @ZelenoJabko 3 ปีที่แล้ว +2

    "javascript:" in the URL is nasty. This should have been banned a long time ago.

  • @shiv_yt3
    @shiv_yt3 2 ปีที่แล้ว +1

    please give your content more space, it's hard to read. Use a green screen or something to show yourself.

  • @dmitry.gashko
    @dmitry.gashko 3 ปีที่แล้ว

    Please, never use javascript: !!! (use it only for xss testing and nothing more)