Data Explorer may have allowed external domains such as
doubleclick.net, .googletagmanager.com, or *.google-analytics.com to run JavaScript scripts,
for certain URLs in the Content Security Policy (CSP) headers. This may lead to Common
Weakness Enumeration (CWE-16). To secure Hue from CWE-16 class of weaknesses, you can add
the X-Content-Type-Options response HTTP header and prevent attacks based on MIME-type
confusions in Hue’s Advanced Configuration Snippet using Cloudera Manager.
-
Log in to Cloudera Manageras an Administrator.
-
Go to and add the following lines in the Hue Service
Advanced Configuration Snippet (Safety Valve) for
hue_safety_valve.in field:
[desktop]
# X-Content-Type-Options: nosniff This is an HTTP response header
# feature that helps prevent attacks based on MIME-type confusion.
secure_content_security_policy="script-src 'self' 'unsafe-inline' 'unsafe-eval' *.googletagmanager.com *.doubleclick.net data:;img-src 'self' *.doubleclick.net http://*.tile.osm.org *.tile.osm.org *.gstatic.com data:;style-src 'self' 'unsafe-inline' fonts.googleapis.com;connect-src 'self' *.google-analytics.com;frame-src *;child-src 'self' data: *.vimeo.com;object-src 'none'"
-
Click Save Changes.
-
Restart the Hue service.