A Burp Plugin for Detecting Weaknesses in Content Security Policies
GPL-3.0 License
This is a Burp plugin that is designed to passively scan for CSP headers that contain known bypasses as well as other potential weaknesses.
Extender
and then the Options
tab, under the Python Environment heading click Select File ...
and browse to the Jython .jar filebuild-plugin.sh
script, you should see a csp-bypass-plugin.py
file appearExtender
and then the Extensions
tabAdd
in the window that appears, select Python
from the Extension Type
dropdown menuSelect File ...
next to Extension File
and select the generated csp-bypass-plugin.py
fileNext
and you're done!To add bypasses simply edit csp_known_bypasses.py with a domain, and an example payload or description of the bypass. Be sure to use the full domain, the plugin will match wildcards (e.g. if a policy allows *.googleapis.com
it will match against ajax.googleapis.com
). Submit a pull request to get your bypass in the main repository!