Project

General

Profile

Actions

Improvements #13187

open

Allow custom headers to be configured in the config file

Added by Matthias Van Ceulebroeck 11 days ago. Updated 10 days ago.

Status:
InProgress
Priority:
Normal
Target version:
Start date:
11/06/2024
Due date:
% Done:

0%

Estimated time:

Description

Similar to head-matter and meta-headers there should be a headers section in the configuration.

These will define headers that will always be set by the application for each of its responses. By default they will:

  • be as permissive as possible, if they affect functionality.
  • be according to ASVS guidelines (see section 14.4: HTTP Security Headers), if they can be set as such without functionality being affected

Related issues 3 (2 open1 closed)

Related to Bug #13042: Disallow content type sniffingReviewMatthias Van Ceulebroeck09/13/2024

Actions
Related to Bug #8156: X-Frame-Option=SAMEORIGIN doesn't let my application be visualized inside iframeRejected02/26/2021

Actions
Related to Improvements #6584: Make X-Frame-Options a configuration optionNew09/04/2018

Actions
Actions #1

Updated by Matthias Van Ceulebroeck 11 days ago

  • Related to Bug #13042: Disallow content type sniffing added
Actions #2

Updated by Matthias Van Ceulebroeck 11 days ago

  • Related to Bug #8156: X-Frame-Option=SAMEORIGIN doesn't let my application be visualized inside iframe added
Actions #3

Updated by Matthias Van Ceulebroeck 11 days ago

Actions #4

Updated by Matthias Van Ceulebroeck 11 days ago

ASVS headers of importance are:

  • Content-Type
  • Content-Disposition
  • Content Security Policy (CSP)
  • X-Content-Type-Options (nosniff)
  • Strict-Transport-Security (often set by proxy)
  • Referrer-Policy

Only the first two are satisfied.
The last four should be added.

Actions #5

Updated by Romain Mardulyn 10 days ago

  • Status changed from New to InProgress
  • Assignee set to Romain Mardulyn
Actions

Also available in: Atom PDF