Bug ID 740719: ASM CSP header parser does not honor unsafe-inline attribute within script-src directive

Last Modified: Feb 20, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP ASM(all modules)

Known Affected Versions:
13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4

Fixed In:
14.1.0, 13.1.1.2

Opened: Aug 16, 2018
Severity: 3-Major

Symptoms

Browser reports Content-Security-Policy error when ASM modifies the 'Content-Security-Policy' (CSP) header.

Impact

Browser posts 'Content-Security-Policy' error and stops JavaScript execution.

Conditions

1. ASM provisioned. 2. ASM policy attached to a virtual server. 3. CSRF or Ajax blocking page enabled within ASM policy 4. Backend server sends 'Content-Security-Policy' header with 'script-src' 'unsafe-inline' directive.

Workaround

Disable 'Content-Security-Policy' header parsing for ASM policies. To do so, follow these steps: 1. In /usr/share/ts/bin/add_del_internal, run the following command: add csp_enabled 0 2. Restart ASM by running the following command: bigstart restart asm

Fix Information

ASM 'Content-Security-Policy' header parser no longer modifies the 'Content-Security-Policy' header when there is 'script-src' 'unsafe-inline' directive arriving from a backend server. This is correct behavior.

Behavior Change