[Webkit-unassigned] [Bug 51638] Protect path of HTTP Referer Header

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Fri Feb 3 04:00:24 PST 2023


https://bugs.webkit.org/show_bug.cgi?id=51638

Vener Hercde <bejeyag374 at nubotel.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |bejeyag374 at nubotel.com

--- Comment #2 from Vener Hercde <bejeyag374 at nubotel.com> ---
To protect the path of the HTTP Referer header, you can use the following methods:

1. Using SSL (HTTPS) encryption: SSL encryption encrypts the entire request, including the Referer header, so that the path information is not visible to intermediaries.

2. Stripping the Referer header: If the Referer header is not needed for a particular request, it can be stripped at the client-side or server-side to avoid leaking sensitive information.

3. Using the "no-referrer" policy: The "no-referrer" policy can be used to prevent the Referer header from being sent with a particular request. This can be specified in the HTTP response headers or in the HTML <meta> tag.

4. Masking the Referer header: If the Referer header must be sent, the path information can be masked by removing sensitive parts of the https://www.covidtests.co.uk/products/omnitex-face-mask-ffp2-black URL. This can be done either on the client side or the server side.

Note: It's important to keep in mind that the Referer header can still be leaked in some scenarios, such as through browser extensions or cross-site scripting (XSS) attacks, so it should not be relied upon as the sole means of protecting sensitive information.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.webkit.org/pipermail/webkit-unassigned/attachments/20230203/661ef3cd/attachment.htm>


More information about the webkit-unassigned mailing list