Description:
Currently, Document360 KB sites inject the Content Security Policy (CSP) using a <meta> tag in the HTML <head>. This approach:
Is not detected by automated security scanning tools (which check HTTP response headers).
Lacks support for certain directives (frame-ancestors, sandbox).
Is less effective against some XSS scenarios compared to HTTP header–based enforcement.
Additionally, the X-Content-Type-Options: nosniff header is missing, leading to security scan failures. This header is not implemented due to MIME type concerns when customers upload files without proper content types.
Requested Scope:
Implement CSP as an HTTP response header with safe default directives.
Add X-Content-Type-Options: nosniff header (with file content type validation).
Include CSP directives requested by customers:
form-action — restrict form submission destinations.
default-src — define fallback sources for all resource types.
report-uri / report-to — log CSP violations without enforcement.
Review script-src, style-src, frame-src, and worker-src for potential removal of unsafe-inline and unsafe-eval.
Benefits:
Passes industry-standard compliance scans (e.g., securityheaders.com).
Meets customer security requirements without backend intervention.