Skip to content
This repository has been archived by the owner on Nov 4, 2024. It is now read-only.

Remove X-XSS-Protection grading entirely. #490

Closed
wants to merge 1 commit into from

Conversation

lgarron
Copy link

@lgarron lgarron commented Nov 17, 2022

This addresses mozilla/http-observatory-website#254

To quote https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection :

Warning:

Even though this feature can protect users of older web browsers that
don't yet support CSP, in some cases, XSS protection can create XSS
vulnerabilities in otherwise safe websites. See the section below for
more information.

Note:

  • Chrome has removed their XSS Auditor
  • Firefox has not, and will not implement X-XSS-Protection
  • Edge has retired their XSS filter

The cited "section below" provides a concrete example of how the XSS filter can be harmful: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection#vulnerabilities_caused_by_xss_filtering

This PR is a very simple strawperson. It might be worth to select a more "informational" alternative:

  • Recognizing possible header values without giving them a score.
  • Recognizing certain header values as reasonable, such as block.
  • Not grading the header, but putting some sort of notice if the header was observed, e.g. "The Mozilla TLS Observatory used to grade the X-XSS-Protection header, but this is no longer the case. For details, see: [link here]"

@lgarron lgarron force-pushed the remove-x-xss-protection branch from 2a2b395 to 67ae1cb Compare November 17, 2022 22:10
This addresses mozilla/http-observatory-website#254

To quote https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection :

> ### Warning:
>
> Even though this feature can protect users of older web browsers that
> don't yet support CSP, in some cases, XSS protection can create XSS
> vulnerabilities in otherwise safe websites. See the section below for
> more information.
>
> ### Note:
>
> - Chrome has removed their XSS Auditor
> - Firefox has not, and will not implement X-XSS-Protection
> - Edge has retired their XSS filter

The cited "section below" provides a concrete example of how the XSS filter can be harmful: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection#vulnerabilities_caused_by_xss_filtering

This PR is a very simple strawperson. It might be worth doing one of the following instead:

- Recognizing possible header values without giving them a score.
- Recognizing certain header values as reasonable, such as `block`.
- Not grading the header, but putting some sort of notice if the header was observed, e.g. "The Mozilla TLS Observatory used to grade the `X-XSS-Protection` header, but this is no longer the case. For details, see: [link here]"
@lgarron lgarron force-pushed the remove-x-xss-protection branch from 67ae1cb to 31c2b07 Compare November 17, 2022 22:10
@LeoMcA
Copy link
Contributor

LeoMcA commented Jan 23, 2024

This is being handled with #520, thanks!

@LeoMcA LeoMcA closed this Jan 23, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants