Skip to content

A Burp Plugin for Detecting Weaknesses in Content Security Policies

Notifications You must be signed in to change notification settings

aefdr/CSP-Bypass

Repository files navigation

CSP Bypass

This Burp plugin is designed to passively scan and parse CSP headers and automatically detect possibly bypasses and weaknesses.

Installation

Jython Setup

  1. Download the latest Jython 2.7.x .jar file
  2. In Burp select Extender and then the Options tab, under Python Environment heading click Select File ... and browse to the Jython .jar file

CSP Bypass Plugin Setup

  1. Execute the build-plugin.sh script, you should see a csp-bypass-plugin.py file appear
  2. In Burp select Extender and then the Extensions tab
  3. Click Add in the window that appears, select Python from the Extension Type dropdown menu
  4. Click Select File ... next to Extension File and select the generated csp-bypass-plugin.py file
  5. Click Next and you're done!

About

A Burp Plugin for Detecting Weaknesses in Content Security Policies

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 98.8%
  • Other 1.2%