[ 
https://issues.apache.org/jira/browse/WICKET-5406?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16839099#comment-16839099
 ] 

Martin Grigorov commented on WICKET-5406:
-----------------------------------------

As far as I remember we have tried with Function and it didn't work completely.
Unfortunately I don't remember the exact problem. We should add a comment next 
to the usages of eval() once we face it again.

> Better Content Security Policy Support
> --------------------------------------
>
>                 Key: WICKET-5406
>                 URL: https://issues.apache.org/jira/browse/WICKET-5406
>             Project: Wicket
>          Issue Type: Improvement
>          Components: wicket
>            Reporter: Mario Groß
>            Priority: Minor
>              Labels: CSP, Content-Security-Policy, Cross-site-Scripting, 
> Security
>
> A better support of the Content Security Policy 
> (http://en.wikipedia.org/wiki/Content_Security_Policy) would protect against 
> cross-site scripting attacks and improve the security image of wicket. 
> The main problem at the moment is the heavily used inline javascript code 
> which interferes with the whitelisting mechanism of script sources in the CSP 
> and should be avoided .



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to