<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Web Access PT content-security-policy header issues in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Access-PT-content-security-policy-header-issues/m-p/277250#M105522</link>
    <description>&lt;P class=""&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;we are currently building a PoC using the Mobile Access Blade. Our goal is to use a Web Access Portal to publish one of our internal web services.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;During testing, we encountered the following issue related to the CSP header. It appears that the gateway rewrites the CSP header, causing our service to stop functioning correctly because important CSP directives are missing or modified (see attached screenshot).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The application itself is a Spring Boot application with a React frontend. The web service is configured in the Mobile Access Portal with Path Translation enabled. Due to Path Translation, when the &lt;/SPAN&gt;&lt;SPAN&gt;index.html&lt;/SPAN&gt;&lt;SPAN&gt; is accessed, a &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;script&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt; tag containing the variables &lt;/SPAN&gt;&lt;SPAN&gt;___cp_cvpn_prefix_portal&lt;/SPAN&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;SPAN&gt;___cp_cvpn_prefix_web_apps&lt;/SPAN&gt;&lt;SPAN&gt; is automatically injected into the page.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;However, this injected script is blocked by our CSP policies. Relaxing the policy by allowing &lt;/SPAN&gt;&lt;SPAN&gt;'unsafe-inline'&lt;/SPAN&gt;&lt;SPAN&gt; is not considered a secure option for us.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Therefore, we would like to understand:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;How should the configuration be adjusted so that a dynamic nonce is added to the CSP header and also applied to the injected &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;script&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt; tag? Alternatively, is there a supported way to customize or preserve the CSP headers generated by the gateway?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Do you have any recommendations or best practices on how this issue can be resolved properly?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-05-20 23_37_15-.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34283i0A72151CB082B8AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="2026-05-20 23_37_15-.png" alt="2026-05-20 23_37_15-.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2026 08:26:33 GMT</pubDate>
    <dc:creator>Romaryo</dc:creator>
    <dc:date>2026-05-21T08:26:33Z</dc:date>
    <item>
      <title>Web Access PT content-security-policy header issues</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Access-PT-content-security-policy-header-issues/m-p/277250#M105522</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;we are currently building a PoC using the Mobile Access Blade. Our goal is to use a Web Access Portal to publish one of our internal web services.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;During testing, we encountered the following issue related to the CSP header. It appears that the gateway rewrites the CSP header, causing our service to stop functioning correctly because important CSP directives are missing or modified (see attached screenshot).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The application itself is a Spring Boot application with a React frontend. The web service is configured in the Mobile Access Portal with Path Translation enabled. Due to Path Translation, when the &lt;/SPAN&gt;&lt;SPAN&gt;index.html&lt;/SPAN&gt;&lt;SPAN&gt; is accessed, a &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;script&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt; tag containing the variables &lt;/SPAN&gt;&lt;SPAN&gt;___cp_cvpn_prefix_portal&lt;/SPAN&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;SPAN&gt;___cp_cvpn_prefix_web_apps&lt;/SPAN&gt;&lt;SPAN&gt; is automatically injected into the page.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;However, this injected script is blocked by our CSP policies. Relaxing the policy by allowing &lt;/SPAN&gt;&lt;SPAN&gt;'unsafe-inline'&lt;/SPAN&gt;&lt;SPAN&gt; is not considered a secure option for us.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Therefore, we would like to understand:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;How should the configuration be adjusted so that a dynamic nonce is added to the CSP header and also applied to the injected &lt;/SPAN&gt;&lt;SPAN&gt;&amp;lt;script&amp;gt;&lt;/SPAN&gt;&lt;SPAN&gt; tag? Alternatively, is there a supported way to customize or preserve the CSP headers generated by the gateway?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Do you have any recommendations or best practices on how this issue can be resolved properly?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2026-05-20 23_37_15-.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34283i0A72151CB082B8AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="2026-05-20 23_37_15-.png" alt="2026-05-20 23_37_15-.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2026 08:26:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Web-Access-PT-content-security-policy-header-issues/m-p/277250#M105522</guid>
      <dc:creator>Romaryo</dc:creator>
      <dc:date>2026-05-21T08:26:33Z</dc:date>
    </item>
  </channel>
</rss>

