Skip to content

Commit 7784dad

Browse files
committed
Security: Add note about setting Content-Security-Policy in configuration.php to reduce the likeliness of registered users trying to trick others into sending data to other sites - refs SEC#175 and SEC#176
1 parent 0ee56d4 commit 7784dad

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

documentation/security.html

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,16 @@ <h2><a id="6.HSTS">HTTP Headers Security</a></h2>
174174
we highly recommend the <a href="https://securityheaders.io/">securityheaders.io</a>
175175
website. If you want to read more about CSP and all related headers
176176
security techniques, check <a href="https://scotthelme.co.uk/">Scott Helme's blog</a>.
177+
</p>
178+
<p>As per reported vulnerabilities #175 and #176 on
179+
<a href="https://github.com/chamilo/chamilo-lms/wiki/security-issues">our Security Issues page</a>,
180+
we highly recommend setting <em>$_configuration['security_content_policy']</em>, in particular for
181+
elements like 'script-src', 'style-src' and 'form-action' to 'self' or to a limited number of trusted URLs.<br>
182+
In particular, the social wall and the course chat spaces could be abused by some users to trick others
183+
into filling forms that will send personal data to external sites. Letting users edit HTML is useful
184+
but dangerous if you cannot trust people using these features. These features cannot be used by anonymous
185+
users, but portals allowing for open registration could be particularly vulnerable.
186+
</p>
177187
<br />
178188
<hr />
179189
<h2><a id="7.Direct-web-access">Direct web access to files</a></h2>

0 commit comments

Comments
 (0)