Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps - Status | Demo | Docs | Install
  1. Cloudron Forum
  2. Feature Requests
  3. Remove deprecated X-XSS-Protection header from the nginx config

Remove deprecated X-XSS-Protection header from the nginx config

Scheduled Pinned Locked Moved Solved Feature Requests
nginxreverseproxysecurity
6 Posts 2 Posters 28 Views 2 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • milian.hackradtM Offline
    milian.hackradtM Offline
    milian.hackradt
    wrote last edited by girish
    #1

    Cloudron currently sets X-XSS-Protection: 1; mode=block; (https://git.cloudron.io/platform/box/-/blob/master/src/nginxconfig.ejs#L110)

    Mozilla's MDN documentation explicitly warns that "in some cases, X-XSS-Protection can create XSS vulnerabilities in otherwise safe websites" and advises to "avoid using it." Chrome removed the feature, and Firefox never implemented it. Only Internet Explorer fully supported it, and I think we're all glad that IE is not a thing anymore.

    If I understand it correctly, the recommended approach is to either remove the X-XSS-Protection header entirely or explicitly set it to X-XSS-Protection: 0 to disable the legacy XSS filter in older browsers that might still honor it, then rely on properly configured CSP headers for actual protection.

    Given that Cloudron supports CSP, I think there's no justification for keeping a deprecated header that introduces more risk than protection.

    1 Reply Last reply
    1
    • girishG Offline
      girishG Offline
      girish
      Staff
      wrote last edited by
      #2

      Thanks for reporting, I have removed these.

      1 Reply Last reply
      1
      • girishG girish marked this topic as a question
      • girishG girish has marked this topic as solved
      • milian.hackradtM Offline
        milian.hackradtM Offline
        milian.hackradt
        wrote last edited by
        #3

        Thank you!

        1 Reply Last reply
        0
        • milian.hackradtM Offline
          milian.hackradtM Offline
          milian.hackradt
          wrote last edited by
          #4

          I just saw that you also removed X-Content-Type-Options as well as X-Permitted-Cross-Domain-Policies.

          OWASP 1, 2 still recommends these headers so maybe it was a bit hasty to also remove them?

          1 Reply Last reply
          1
          • girishG Offline
            girishG Offline
            girish
            Staff
            wrote last edited by
            #5

            I think X-Permitted-Cross-Domain-Policies is for the long dead adobe flash which used to use some crossdomain.xml . X-Content-Type-Options: nosniff might be worth putting back. But over time, I have removed many headers like X-Frame-Options (which is in OWASP) because they are causing browser warnings.

            1 Reply Last reply
            1
            • milian.hackradtM Offline
              milian.hackradtM Offline
              milian.hackradt
              wrote last edited by
              #6

              I would absolutely advocate for re-adding X-Content-Type-Options: nosniff as long as we don't have a way to set headers directly in the Security Settings of Cloudron Apps (like we can with CSP headers). That header still provides meaningful protection against MIME-sniffing attacks and has widespread browser support.

              Afaik, X-Permitted-Cross-Domain-Policies is still used by Acrobat (which is unfortunately far from dead), but I agree it's fair to remove it from the default configuration since it's an edge-case.

              1 Reply Last reply
              0

              Hello! It looks like you're interested in this conversation, but you don't have an account yet.

              Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.

              With your input, this post could be even better 💗

              Register Login
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Don't have an account? Register

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • Bookmarks
              • Search