
OPERATIONAL DEFECT DATABASE
...

...
Web app flow might fail resulting in JavaScript errors related to CSP policy.
Web application flow might fail.
-- ASM provisioned. -- Bot-Defense or DoS Application profile assigned to a virtual server. -- The backend server sends CSP headers.
Attach an iRule: when HTTP_REQUEST { set csp 0 } when HTTP_RESPONSE { if { [HTTP::header exists Content-Security-Policy] } { set csp "[HTTP::header value Content-Security-Policy]" } } when HTTP_RESPONSE_RELEASE { if { $csp != 0 } { HTTP::header replace Content-Security-Policy $csp } set csp 0 }
A db variable has been added to disable CSP headers modification: tmsh modify sys db botdefense.content_security_policy enable|disable It is enabled by default.
Click on a version to see all relevant bugs
F5 Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.