mirror of
https://github.com/go-gitea/gitea.git
synced 2026-03-12 02:24:21 -05:00
Content-Security-Policy #94
Open
opened 2025-11-02 03:08:32 -06:00 by GiteaMirror
·
50 comments
No Branch/Tag Specified
main
release/v1.25
release/v1.24
release/v1.23
release/v1.22
release/v1.21
release/v1.20
release/v1.19
release/v1.18
release/v1.17
release/v1.16
release/v1.15
release/v1.14
release/v1.13
release/v1.12
release/v1.11
release/v1.10
release/v1.9
release/v1.8
v1.25.3
v1.25.2
v1.25.1
v1.25.0
v1.24.7
v1.25.0-rc0
v1.26.0-dev
v1.24.6
v1.24.5
v1.24.4
v1.24.3
v1.24.2
v1.24.1
v1.24.0
v1.23.8
v1.24.0-rc0
v1.25.0-dev
v1.23.7
v1.23.6
v1.23.5
v1.23.4
v1.23.3
v1.23.2
v1.23.1
v1.23.0
v1.23.0-rc0
v1.24.0-dev
v1.22.6
v1.22.5
v1.22.4
v1.22.3
v1.22.2
v1.22.1
v1.22.0
v1.23.0-dev
v1.22.0-rc1
v1.21.11
v1.22.0-rc0
v1.21.10
v1.21.9
v1.21.8
v1.21.7
v1.21.6
v1.21.5
v1.21.4
v1.21.3
v1.21.2
v1.20.6
v1.21.1
v1.21.0
v1.21.0-rc2
v1.21.0-rc1
v1.20.5
v1.22.0-dev
v1.21.0-rc0
v1.20.4
v1.20.3
v1.20.2
v1.20.1
v1.20.0
v1.19.4
v1.21.0-dev
v1.20.0-rc2
v1.20.0-rc1
v1.20.0-rc0
v1.19.3
v1.19.2
v1.19.1
v1.19.0
v1.19.0-rc1
v1.20.0-dev
v1.19.0-rc0
v1.18.5
v1.18.4
v1.18.3
v1.18.2
v1.18.1
v1.18.0
v1.17.4
v1.18.0-rc1
v1.19.0-dev
v1.18.0-rc0
v1.17.3
v1.17.2
v1.17.1
v1.17.0
v1.17.0-rc2
v1.16.9
v1.17.0-rc1
v1.18.0-dev
v1.16.8
v1.16.7
v1.16.6
v1.16.5
v1.16.4
v1.16.3
v1.16.2
v1.16.1
v1.16.0
v1.15.11
v1.17.0-dev
v1.16.0-rc1
v1.15.10
v1.15.9
v1.15.8
v1.15.7
v1.15.6
v1.15.5
v1.15.4
v1.15.3
v1.15.2
v1.15.1
v1.14.7
v1.15.0
v1.15.0-rc3
v1.14.6
v1.15.0-rc2
v1.14.5
v1.16.0-dev
v1.15.0-rc1
v1.14.4
v1.14.3
v1.14.2
v1.14.1
v1.14.0
v1.13.7
v1.14.0-rc2
v1.13.6
v1.13.5
v1.14.0-rc1
v1.15.0-dev
v1.13.4
v1.13.3
v1.13.2
v1.13.1
v1.13.0
v1.12.6
v1.13.0-rc2
v1.14.0-dev
v1.13.0-rc1
v1.12.5
v1.12.4
v1.12.3
v1.12.2
v1.12.1
v1.11.8
v1.12.0
v1.11.7
v1.12.0-rc2
v1.11.6
v1.12.0-rc1
v1.13.0-dev
v1.11.5
v1.11.4
v1.11.3
v1.10.6
v1.12.0-dev
v1.11.2
v1.10.5
v1.11.1
v1.10.4
v1.11.0
v1.11.0-rc2
v1.10.3
v1.11.0-rc1
v1.10.2
v1.10.1
v1.10.0
v1.9.6
v1.9.5
v1.10.0-rc2
v1.11.0-dev
v1.10.0-rc1
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9.0
v1.9.0-rc2
v1.10.0-dev
v1.9.0-rc1
v1.8.3
v1.8.2
v1.8.1
v1.8.0
v1.8.0-rc3
v1.7.6
v1.8.0-rc2
v1.7.5
v1.8.0-rc1
v1.9.0-dev
v1.7.4
v1.7.3
v1.7.2
v1.7.1
v1.7.0
v1.7.0-rc3
v1.6.4
v1.7.0-rc2
v1.6.3
v1.7.0-rc1
v1.7.0-dev
v1.6.2
v1.6.1
v1.6.0
v1.6.0-rc2
v1.5.3
v1.6.0-rc1
v1.6.0-dev
v1.5.2
v1.5.1
v1.5.0
v1.5.0-rc2
v1.5.0-rc1
v1.5.0-dev
v1.4.3
v1.4.2
v1.4.1
v1.4.0
v1.4.0-rc3
v1.4.0-rc2
v1.3.3
v1.4.0-rc1
v1.3.2
v1.3.1
v1.3.0
v1.3.0-rc2
v1.3.0-rc1
v1.2.3
v1.2.2
v1.2.1
v1.2.0
v1.2.0-rc3
v1.2.0-rc2
v1.1.4
v1.2.0-rc1
v1.1.3
v1.1.2
v1.1.1
v1.1.0
v1.0.2
v1.0.1
v1.0.0
v0.9.99
Labels
Clear labels
$20
$250
$50
$500
backport/done
💎 Bounty
docs-update-needed
good first issue
hacktoberfest
issue/bounty
issue/confirmed
issue/critical
issue/duplicate
issue/needs-feedback
issue/not-a-bug
issue/regression
issue/stale
issue/workaround
lgtm/need 2
modifies/api
modifies/translation
outdated/backport/v1.18
outdated/theme/markdown
outdated/theme/timetracker
performance/bigrepo
performance/cpu
performance/memory
performance/speed
pr/breaking
proposal/accepted
proposal/rejected
pr/wip
pull-request
reviewed/wontfix
💰 Rewarded
skip-changelog
status/blocked
topic/accessibility
topic/api
topic/authentication
topic/build
topic/code-linting
topic/commit-signing
topic/content-rendering
topic/deployment
topic/distribution
topic/federation
topic/gitea-actions
topic/issues
topic/lfs
topic/mobile
topic/moderation
topic/packages
topic/pr
topic/projects
topic/repo
topic/repo-migration
topic/security
topic/theme
topic/ui
topic/ui-interaction
topic/ux
topic/webhooks
topic/wiki
type/bug
type/deprecation
type/docs
type/enhancement
type/feature
type/miscellaneous
type/proposal
type/question
type/refactoring
type/summary
type/testing
type/upstream
Mirrored from GitHub Pull Request
Milestone
No items
No Milestone
Projects
Clear projects
No project
No Assignees
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/gitea#94
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @bamboleeeero-bamboleeeero on GitHub (Nov 29, 2016).
There seems to be a bunch of inline scripts or style rules such as this that don't play nice with CSP. These should be replaced by a CSS class.
Want to back this issue? Post a bounty on it! We accept bounties via Bountysource.
@bkcsoft commented on GitHub (Dec 2, 2016):
Yes, that should be a class, not inline style :)
@Eriner commented on GitHub (Dec 11, 2016):
As a note:
report-uriis a CSP directive that informs the browser where to report violations. Something to consider is providing/setting this directive and ingesting it into gitea to make it available to administrators.@denji commented on GitHub (Dec 17, 2016):
https://github.com/unrolled/secure#content-security-policy
@Bwko commented on GitHub (Dec 18, 2016):
I'm currently implementing a Content-Security-Policy but we need style-src: unsafe-inline & script-src: unsafe-eval for semantic ui & jquery datetimepicker.
@bamboleeeero-bamboleeeero any advice on this?
@tboerger commented on GitHub (Dec 18, 2016):
We should get rid of all inline crap.
@Bwko commented on GitHub (Dec 18, 2016):
@tboerger I'm almost done with that (except for labels) but for tooltips semantic ui needs unsafe-inline 😕
@tboerger commented on GitHub (Dec 18, 2016):
Even tooltips can be perfectly done with data attributes and unobtrusive js.
@hasufell commented on GitHub (Jun 6, 2018):
any news?
@clarfonthey commented on GitHub (Jun 23, 2018):
Personally, I would appreciate at least adding a content-security-policy header to Gitea, slowly making it more strict as changes are made. At least things like
form-actionandframe-ancestorswould be nice, which are doable now.I'd be willing to work on this within the next few days if someone more-acquainted with the codebase isn't up to it!
@toth-dev commented on GitHub (Jun 23, 2018):
I'm adding this CSP with nginx:
Everything seems to work with this.
@hasufell commented on GitHub (Jun 23, 2018):
@totpet interesting, I tried that too and it seems to work so far, but afais mozilla observatory reports this as -20 score, so it seems to be too lax.
@clarfonthey commented on GitHub (Jun 23, 2018):
As I said, things like
frame-ancestorsandform-actionare really important parts of CSP that we could add for existing gitea. Addingunsafe-inlineandunsafe-evalto JavaScript are really bad though, and that pretty much negates everything else.@toth-dev commented on GitHub (Jun 24, 2018):
My policy broke the embedded pdf viewer, because it is loaded as an iframe, and
frame-srcfalls back todefault-src, adding this fixes the problem:frame-src 'self'; frame-ancestors 'self'(
frame-ancestorsonly needs'default'insidevendor/plugins/pdfjs/web/, for other locations it can be set to'none')@stale[bot] commented on GitHub (Jan 21, 2019):
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs during the next 2 weeks. Thank you for your contributions.
@Oreolek commented on GitHub (Jul 7, 2019):
Any news on this? Keep in mind the "Gitea behind a reverse proxy" case where Gitea won't be able to change CSP header dynamically.
@noplanman commented on GitHub (Sep 4, 2019):
I'm running into this issue too, would be great to get this built-in 👌
@MetroWind commented on GitHub (Nov 20, 2019):
New user here. I’d also love to see this sorted out. Beside inlines, I think there are also some evals, because I had to add
unsafe-evalto my CSP header for that activity matrix thingy in the dashboard page to show up.@hasufell commented on GitHub (Mar 27, 2020):
@MetroWind to which header?
@dpertin commented on GitHub (Mar 30, 2020):
I used the Mozilla Laboratory to generate the following CSP:
Everything seems to work with
nginx, but the Google CSP Evaluator notifies a high-priority issue due to the use of 'unsafe-inline' inscript-src. I'd love to see all those inline scripts either externalized, or whitelisted by supporting nonces as proposed here.@SuperSandro2000 commented on GitHub (Apr 2, 2020):
img-src 'self' https://ga-beacon.appspot.com https://raw.githubusercontent.com https://secure.gravatar.com https://sourcethemes.com;This should probably be more like:
img-src 'self' https://raw.githubusercontent.com https://secure.gravatar.com;@tomposmiko commented on GitHub (Jul 6, 2020):
Can we count on fixing this issue ever?
I'm wondering if it will ever happen or we should plan with not fixing it ever.
@alexanderadam commented on GitHub (Jul 6, 2020):
@tomposmiko most free softwares don't have dedicated developers who are able to make a living by working on them. Meaning, that you can not rely that a feature or a bugfix will be implemented on one point. It is also important that you understand, that this is not specific to gitea, however.
On the plus side, you can usually implement those things by yourself or pay someone to do it.
If I'm not mistaken, this issue wasn't important enough for anyone here, to pay anything, however.
And it wasn't important enough to anyone to invest their valuable time fixing this issue neither.
Now it should be clear, that it would need clairvoyant abilities to answer your question properly. Because this is not a commercial product that can afford ensuring due dates for features or bugfixes reliably.
@SuperSandro2000 commented on GitHub (Jul 6, 2020):
Not that it is different if your paying for software 😆
@Crocmagnon commented on GitHub (Apr 24, 2021):
Could we at least make gitea serve its own CSP? IMO it's the responsibility of the app to know what it needs to load and from where. Even if we're not going to implement a safe CSP in the first iteration, I'd suggest starting by providing one and then refining it when we clean the inlines and evals.
An even easier first step might be to provide a CSP in the documentation that admins can set on their proxies and after some time implementing it in the code.
@ix5 commented on GitHub (Feb 23, 2022):
Just as a current (2022, gitea 1.16.1) reference point, I have the following policy implemented and haven't had any (
gitea-related) pings on myreport-uri:Content-Security-Policy-Report-Only: "default-src 'self'; connect-src 'self'; font-src 'self' data:; form-action 'self'; img-src 'self' https: data:; object-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; worker-src 'self';"Edit: Amended with below comment (which I can confirm):
Content-Security-Policy-Report-Only "default-src 'self'; connect-src 'self'; font-src 'self' data:; form-action 'self'; img-src 'self' https: data:; manifest-src 'self' data:; object-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; worker-src 'self';"Admins who would like to tighten that policy up (esp.
img-src https) should be free to do so, but I think this is a good baseline.@tepozoa commented on GitHub (Mar 30, 2022):
Generally following the above, I ran into Chrome refusing to load a
manifest-srcbase64 encoded element as it wasn't explicitly allowed to usedata:and was inheritingdefault-srcattributes. Addingmanifest-src 'self' data:;onto the above solved that Chrome error.@silverwind commented on GitHub (Apr 26, 2023):
script-src: unsafe-inlinewill probably required indefinitely. There are techniques that can only work with inline script like synchronously altering DOM during rendering to avoid content pop-in, so I see it as a requirement for a ideal experience. I made an attempt to remove inline script in https://github.com/go-gitea/gitea/pull/21429, but it was not well received as it's quite a hack.We should put out a CSP recommendation in the docs as a guidline on how to set up the most strict CSP possible for gitea to work, but I don't see anything else to be done here.
@clarfonthey commented on GitHub (Apr 26, 2023):
I'm not 100% sure of the details, but surely simply hashing the critical JS would be a solution here? CSP supports this, and it means you'd be able to say that these scripts could be run without anything else being allowed. The hash might change between releases, but I don't imagine that being difficult for folks to deal with if they really care that much over using
unsafe-inline.IMHO the most important aspect of this would be to have similar docs recommending a CSP header for gitea, or having gitea output one itself, even if it does include
unsafe-inline. Could this issue be kept open until that is finished?@silverwind commented on GitHub (Apr 26, 2023):
Guess we can keep open for docs.
What technique is that? Any more info?
@clarfonthey commented on GitHub (Apr 26, 2023):
MDN has you covered: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src
Essentially, you can add
sha256-(hash)to the list of allowed sources in the CSP header.@silverwind commented on GitHub (Apr 26, 2023):
Hmm I guess we could set a static
nonceon all our inline scripts and CSP could be recommended to use that nonce. It won't be a hash as it needs to work across upgrades.@jotoho commented on GitHub (Apr 26, 2023):
If Gitea emitted the CSP-header itself, it could dynamically calculate the hashes of the inline scripts it sends, couldn't it?
I wouldn't be surprised if browsers or the standardization committees implement additional measures (in the future if they haven't already) to prevent usage of nonces that are used more than once.
@tepozoa commented on GitHub (Apr 26, 2023):
If you're running other resource paths on your frontend and need CSP policies to accommodate their needs, having Gitea generate a full header could be problematic. I found this issue discussing the spec outlining that multiple headers are not to be sent by a server though, but if they are they are evaluated as individuals and not a combined directive.
Given what I read in the above, a toggle in app.ini to allow an admin to disable Gitea from generating it's own CSP header has to be present, as the Gitea header may conflict with what they're running in their reverse proxy layer.
@silverwind commented on GitHub (Apr 26, 2023):
Yes, own CSP header is problematic when reverse proxies "Add" instead of "Replace" the header, which I think is the most common configuration. So I think we should just put out a recommendation in docs initially.
Also, I do not see inline scripts as the grave security problem that some sites make it out to be. If everything is first-party, a inline script is equivalent to a url-sourced script in terms of security. I would not recommend running third-party scripts on Gitea anyways.
@clarfonthey commented on GitHub (Apr 26, 2023):
The main benefit of disallowing inline scripts is to proactively prevent XSS and other vulnerabilities from working even if someone manages to get a script tag in the DOM. I agree that the threat model is probably overprotective in some cases, but it's not just about whether there's an external script or not.
@silverwind commented on GitHub (Apr 26, 2023):
Reading MDN nonce it does seem something that would be easy to support, just generate a random number per HTML request and add it to all resource tags (inline or not).
If we set CSP ourselves in gitea, it will need extensive configurability so users can include 3rd party resources and the like, e.g. a format in config like
{"script-src": ["https://example.com"]}to define additional directives.@nicheosala commented on GitHub (Feb 8, 2024):
I'm trying to remove inline JS scripts from Gitea, so that we can avoid
script-src: 'unsafe-inline'in CSP.My main problem is the inline script in templates/base/head_script.tmpl: does anyone have a any idea how to move it to a separate JS file? It is obtained mixing Go templates and Javascript.
I'm not an expert on Go templates and can't find a solution to the above problem. The other inline scripts are not many and they do not mix templates and Javascript. I can list them using VS Code (don't consider the ones that start with
<script src, they are fine):@wxiaoguang commented on GitHub (Feb 9, 2024):
As one of the people who do a lot of Gitea frontend refactoring works, I would say that avoiding inline
<script>is not possible at the moment -- at least, very difficult. Actuallyhead_script.tmplis the easiest one, it could be replaced by some data attribute tags. But, the real blockers are some other<script>blocks which heavily depend on the JS code in page.@nicheosala commented on GitHub (Feb 10, 2024):
Thank you @wxiaoguang. I think that any reduction of inline scripts is useful for the security of Gitea, although this is an objective often overlooked in favor of others. Maybe I'm particularly sensitive, since the cybersecurity professor just taught us how to carry out XSS attacks 😂
I'll try to study the Gitea code better (and the Go language and its templates) and help out.
@silverwind commented on GitHub (Mar 23, 2024):
Inline scripts can be exempted from CSP by adding a
nonceAlso, I think there is nothing preventing us from serving a 1st-party CSP. Load balancers can always override or extend it.
@georglauterbach commented on GitHub (Jul 3, 2025):
Using scripts with NONCEs would indeed be a viable option but requires work from Gitea's side. It is probably worthwhile, though, to invest in the CSP header, especially because it is widely adopted and performs relatively well. Moreover, other headers depend on the CSP for extended functionality.
Using
script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';is not regarded safe and should be changed.@wxiaoguang commented on GitHub (Jul 4, 2025):
Actually there is another blocker: htmx. For example: user can inject
hx-attributes to an element and trigger htmx call.Do you have ideas about how to add "script nonce" to htmx elements correctly? @yardenshoham
@yardenshoham commented on GitHub (Jul 4, 2025):
There is
htmx.config.inlineScriptNoncefrom https://htmx.org/reference/:If htmx becomes the only blocker, I will solve it.
@wxiaoguang commented on GitHub (Jul 4, 2025):
If you can resolve htmx, then I can manage to bring CSP nonce protection into Gitea. Then this issue can be closed.
After looking into "inlineScriptNonce", I guess it isn't what we need. It only adds "nonce" attribute to returned HTML content, but it doesn't protect the rendered content.
For example (https://github.com/go-gitea/gitea/issues/305#issuecomment-3034111611): user can inject
hx-attributes to an element and trigger htmx call. I think HTMX should prevent such injected code from running by checking nonce. Otherwise attackers can injecthx-contents to call any backend endpoint (for example: edit something, delete something, or change permissions)@yardenshoham commented on GitHub (Jul 5, 2025):
I did some research. The best solution, I think, is this htmx extension. However, I don't know enough about Gitea to be sure about it. I feel like it would be a good fit for your nonce plan. Do you agree?
@wxiaoguang commented on GitHub (Jul 6, 2025):
Does that extension "protect the rendered content" (to prevent attacker injected
hx-contents from running) ? It seems that it also only "only adds 'nonce' attribute to returned HTML content"@yardenshoham commented on GitHub (Jul 28, 2025):
So should we do this or https://github.com/go-gitea/gitea/issues/35059?
@wxiaoguang commented on GitHub (Jul 29, 2025):
Sorry I don't understand what “this” / "or" mean ... I think we should do both (use CSP, remove htmx).
@yardenshoham commented on GitHub (Jul 29, 2025):
I meant should we try to implement CSP with htmx or remove htmx? I understand your answer is remove htmx.
@wxiaoguang commented on GitHub (Jul 29, 2025):
I do not think it is possible to make htmx work with CSP protection. htmx's fragile design and quirk behaviors make it not suitable for a large project.