Bug ID 754109: ASM content-security-policy header modification violates Content Security Policy directive

Last Modified: Sep 06, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP ASM(all modules)

Known Affected Versions:
13.1.0,,,,,,,,, 13.1.1,,,,,, 13.1.3, 14.0.0,,,,,, 14.0.1, 14.1.0,,,,,,, 14.1.2

Fixed In:

Opened: Dec 26, 2018
Severity: 4-Minor


When the backend server sends a content-security-policy header where source-src and default-src directives are missing, ASM will modify the header when it does its own JavaScript injection, which might cause a csp policy violation for inline JavaScript code.


Inline JavaScript does not run. The Browser reports a content-security-policy violation.


-- ASM provisioned. -- ASM policy attached on a virtual server. -- ASM policy has CSRF or AJAX Blocking page enabled.


Disable csp in ASM by running the following commands: -- /usr/share/ts/bin/add_del_internal add csp_enabled 0 -- bigstart restart asm

Fix Information

ASM no longer modifies the csp header when both source-src and default-src directives are missing.

Behavior Change