diff options
author | David Rothstein <drothstein@gmail.com> | 2015-10-03 15:13:35 -0400 |
---|---|---|
committer | David Rothstein <drothstein@gmail.com> | 2015-10-03 15:13:35 -0400 |
commit | c9d188950508f104a8115ec7a78335607d9b6037 (patch) | |
tree | 0a9c32d16f83baab39d252a5f69bf4bcf87dc725 | |
parent | 47d24ed171bcb4c6aca409ce8af0844a06520f5c (diff) | |
download | brdo-c9d188950508f104a8115ec7a78335607d9b6037.tar.gz brdo-c9d188950508f104a8115ec7a78335607d9b6037.tar.bz2 |
Issue #462950 by pwolanin, Pere Orga: Mitigate the security risks that come from IE, Chrome and other browsers trying to sniff the mime type
-rw-r--r-- | .htaccess | 6 | ||||
-rw-r--r-- | CHANGELOG.txt | 2 | ||||
-rw-r--r-- | includes/bootstrap.inc | 4 |
3 files changed, 12 insertions, 0 deletions
@@ -141,3 +141,9 @@ DirectoryIndex index.php index.html index.htm </FilesMatch> </IfModule> </IfModule> + +# Add headers to all responses. +<IfModule mod_headers.c> + # Disable content sniffing, since it's an attack vector. + Header always set X-Content-Type-Options nosniff +</IfModule> diff --git a/CHANGELOG.txt b/CHANGELOG.txt index 23b66697d..069595046 100644 --- a/CHANGELOG.txt +++ b/CHANGELOG.txt @@ -1,6 +1,8 @@ Drupal 7.40, xxxx-xx-xx (development version) ----------------------- +- Set the X-Content-Type-Options header to "nosniff" when possible, to prevent + certain web browsers from picking an unsafe MIME type. - Prevented the database API from executing multiple queries at once on MySQL, if the site's PHP version is new enough to do so. This is a secondary defense against SQL injection attacks. diff --git a/includes/bootstrap.inc b/includes/bootstrap.inc index efddf006a..b2f2b042e 100644 --- a/includes/bootstrap.inc +++ b/includes/bootstrap.inc @@ -1262,6 +1262,10 @@ function drupal_page_header() { $default_headers = array( 'Expires' => 'Sun, 19 Nov 1978 05:00:00 GMT', 'Cache-Control' => 'no-cache, must-revalidate, post-check=0, pre-check=0', + // Prevent browsers from sniffing a response and picking a MIME type + // different from the declared content-type, since that can lead to + // XSS and other vulnerabilities. + 'X-Content-Type-Options' => 'nosniff', ); drupal_send_headers($default_headers); } |