Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Change XSS header default to '0' #4352

Merged
merged 1 commit into from
May 1, 2022
Merged

Change XSS header default to '0' #4352

merged 1 commit into from
May 1, 2022

Conversation

devinivy
Copy link
Member

This adds support for configuring the x-xss-protection security header to 0, and makes that the default in light of security issues that have been identified with XSS auditors/filters which are enabled by this header. This is also OWASP's recommendation, and it's widely employed by sites such as Facebook, Google, and this one (GitHub!).

Resolves #4327

@devinivy devinivy added feature New functionality or improvement breaking changes Change that can breaking existing code security Issue with security impact labels Apr 29, 2022
@devinivy devinivy added this to the 21.0.0 milestone Apr 29, 2022
Copy link
Member

@Nargonath Nargonath left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. There was a failing test, I launched again the tests suite and it passed. Well done @devinivy for the work.

@devinivy devinivy merged commit df42a0c into v21 May 1, 2022
@devinivy devinivy deleted the change-xss-header-default branch May 1, 2022 04:58
@devinivy devinivy mentioned this pull request Nov 7, 2022
allbto-mck added a commit to allbto-mck/hapi that referenced this pull request Dec 1, 2022
hapijs#4352 has changed the way xss behaves but the types were not updated yet.
@allbto-mck allbto-mck mentioned this pull request Dec 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
breaking changes Change that can breaking existing code feature New functionality or improvement security Issue with security impact
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants