<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Continued security weaknesses being ignored by Hubspot in CMS Development</title>
    <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/906823#M37477</link>
    <description>&lt;P&gt;2024 and this is still an issue.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jan 2024 11:25:25 GMT</pubDate>
    <dc:creator>Jbads</dc:creator>
    <dc:date>2024-01-17T11:25:25Z</dc:date>
    <item>
      <title>Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/268983#M12148</link>
      <description>&lt;P&gt;Our security assessment service providers continue to report security configuration weaknesses on our Hubspot instances. For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Website does not implement X-Frame-Options Best Practices&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options" target="_blank" rel="noopener"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Website does not implement X-XSS-Protection Best Practices&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection" target="_blank" rel="noopener"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://scotthelme.co.uk/hardening-your-http-response-headers/" target="_blank" rel="noopener"&gt;https://scotthelme.co.uk/hardening-your-http-response-headers/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Website does not implement X-Content-Type-Options Best Practices&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options" target="_blank" rel="noopener"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This is seriously affecting our IT Security compliance efforts as it appears to our regulators and auditors that our service provider is not taking security seriously, and we may be forced to switch to an alternative supplier.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I know these problems have been reported to Hubspot previously and yet no action has been taken.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Can you please provide an update on Hubspot's intention to either ignore security standards and best practice so we can make a quick decision to move supplier, or state when you intend to resolve these issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ken&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 May 2019 10:22:58 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/268983#M12148</guid>
      <dc:creator>kenord</dc:creator>
      <dc:date>2019-05-08T10:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/269299#M12166</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hubspot.com/t5/user/viewprofilepage/user-id/93884"&gt;@kenord&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your feedback! I appreciate you bringing these questions to the Community. I wanted to share the following status updates with you:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. X-Frame-Options&lt;/P&gt;
&lt;P&gt;The challenges with these kinds of HTTP headers are that it is easy to break expected website functionality. Unexpected behavior related to the headers takes expertise to troubleshoot; and the header construct needs to be updated regularly as content structure is changed. This header is designed to prevent HTML or javascript from working in certain (and possibly intended) cases. For instance, if X-frame-options was implemented by default, then customers would need to pre-identify all domains on which they wanted to frame landing pages and other content. This would add complexity to the customer experience without appreciably lowering the risk of clickjacking.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that said, it is possible to embed mechanisms like frame busting (i.e., equivalent to X-frame-options) into the HTML header of your sites where you deem appropriate. Those options give you control over how additional protections are implemented. If you decide to implement the functions in HTML, please be aware that domain-agnostic frame-busting javascript will interfere with typical use of content editing features in your HubSpot portal. In particular, the preview pane you see when you're editing a blog post, email, or website is presented within a frame. If you configured that page (or the design layout) to prevent iframes, it's possible that you won't be able to use the content editing tools that are available in your portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. X-XSS&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;M&lt;/SPAN&gt;&lt;SPAN&gt;ost modern browsers default to 'X-XSS-Protection: 1'. That means that the browser will prevent a detected cross-site scripting attack by default, and doesn't require a header from the visited website to protect itself.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. X-Content Type-Options&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The HubSpot platform does not set the X-Content-Type-Options header to 'nosniff'. Rather, we set a MIME type so sniffing does not occur in general. The HubSpot platform automatically sets a MIME type for javascript and CSS files, in particular.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HubSpot will not be modifying these policies for the reasons outlined above.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Jenny&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 13:54:45 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/269299#M12166</guid>
      <dc:creator>jennysowyrda</dc:creator>
      <dc:date>2019-05-09T13:54:45Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/276299#M12690</link>
      <description>&lt;P&gt;Thanks for the #security update Jenny.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2019 12:16:44 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/276299#M12690</guid>
      <dc:creator>MFrankJohnson</dc:creator>
      <dc:date>2019-06-20T12:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/305351#M14506</link>
      <description>&lt;P&gt;After performing scans for our site just this month I am seeing those same issues and others that shouldn't be there. Most issues are simple fixes they can make to their servers and site base header templates.&lt;BR /&gt;&lt;BR /&gt;HubSpot needs to fix these issues or risk losing customers to another CRM that takes security seriously.&lt;BR /&gt;&lt;BR /&gt;"&lt;/P&gt;&lt;P&gt;No Anti-CSRF tokens were found in a HTML submission form.&lt;BR /&gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.&lt;/P&gt;&lt;P&gt;CSRF attacks are effective in a number of situations, including:&lt;BR /&gt;* The victim has an active session on the target site.&lt;BR /&gt;* The victim is authenticated via HTTP auth on the target site.&lt;BR /&gt;* The victim is on the same local network as the target site.&lt;/P&gt;&lt;P&gt;CSRF has primarily been used to perform an action against a target site using the victim's privileges, but recent techniques have been discovered to disclose information by gaining access to the response. The risk of information disclosure is dramatically increased when the target site is vulnerable to XSS, because XSS can be used as a platform for CSRF, allowing the attack to operate within the bounds of the same-origin policy.&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 17:34:07 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/305351#M14506</guid>
      <dc:creator>RonRattie</dc:creator>
      <dc:date>2019-12-03T17:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/308019#M14743</link>
      <description>&lt;P&gt;Regarding this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;1. X-Frame-Options&lt;/P&gt;&lt;P&gt;The challenges with these kinds of HTTP headers are that it is easy to break expected website functionality. Unexpected behavior related to the headers takes expertise to troubleshoot; and the header construct needs to be updated regularly as content structure is changed. This header is designed to prevent HTML or javascript from working in certain (and possibly intended) cases. For instance, if X-frame-options was implemented by default, then customers would need to pre-identify all domains on which they wanted to frame landing pages and other content. This would add complexity to the customer experience without appreciably lowering the risk of clickjacking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With that said, it is possible to embed mechanisms like frame busting (i.e., equivalent to X-frame-options) into the HTML header of your sites where you deem appropriate. Those options give you control over how additional protections are implemented. If you decide to implement the functions in HTML, please be aware that domain-agnostic frame-busting javascript will interfere with typical use of content editing features in your HubSpot portal. In particular, the preview pane you see when you're editing a blog post, email, or website is presented within a frame. If you configured that page (or the design layout) to prevent iframes, it's possible that you won't be able to use the content editing tools that are available in your portal."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is Hubspot acquiring any "expertise" to fix these issues? This issue was reported early this year and Hubspot is still regurgitating the same info(above). I think customers just want to know if Hubspot is doing anything to fix the issue other than telling customers to frame-bust in exchange for content editing functionality.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 15:23:46 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/308019#M14743</guid>
      <dc:creator>Samtp</dc:creator>
      <dc:date>2019-12-17T15:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/308022#M14744</link>
      <description>&lt;P&gt;What if Hubspot writes some logic that allows customers to implement these headers if we want... and disables the headers when the customer is logged in and has access to the inline editing features?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Dec 2019 15:27:13 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/308022#M14744</guid>
      <dc:creator>RonRattie</dc:creator>
      <dc:date>2019-12-17T15:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/328270#M15853</link>
      <description>&lt;P&gt;We agree. Our automatically generated security score from sites like&amp;nbsp;securityscorecard.io is lowered due to this issue (X-Frame-Options). It would be great if we had a toggle to activate these on demand.&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 14:58:29 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/328270#M15853</guid>
      <dc:creator>heltewig</dc:creator>
      <dc:date>2020-03-28T14:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/377270#M19016</link>
      <description>&lt;P&gt;I was directed here by HubSpot support after asking about the X-Frame-Options header.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;I understand that using the header can break things, but my objection to the response given here is that HubSpot &lt;EM&gt;already has&lt;/EM&gt; multi-domain X-Frame-Options configuration as a feature in Enterprise. It isn't a new feature request -- you already solved it. My organization doesn't need Enterprise, and we don't want to configure the header for multiple domains. We feel that in our simple case, it should be possible to enable this basic protection for our single domain, and advanced users can pay for the advanced usage if they need it.&lt;BR /&gt;&lt;BR /&gt;Secure defaults should be HubSpot's defaults wherever possible, and best practices shouldn't require an Enterprise license, in my opinion.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 08:41:47 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/377270#M19016</guid>
      <dc:creator>st0nez</dc:creator>
      <dc:date>2020-10-08T08:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/408258#M21083</link>
      <description>&lt;DIV&gt;We also are experiencing similar issues and we believe security parameters must be a default. Our site is badly scored because of this by many third parties.&lt;/DIV&gt;</description>
      <pubDate>Thu, 11 Feb 2021 08:36:15 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/408258#M21083</guid>
      <dc:creator>TNardini</dc:creator>
      <dc:date>2021-02-11T08:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/744007#M32389</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.hubspot.com/t5/user/viewprofilepage/user-id/3685"&gt;@jennysowyrda&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P data-unlink="true"&gt;Thanks for your answer, however in our case it is not valid. According to &lt;A href="https://knowledge.hubspot.com/domains-and-urls/ssl-and-domain-security-in-hubspot#additional-domain-security-settings-cms-hub-only" target="_blank" rel="noopener"&gt;this page&lt;/A&gt;&amp;nbsp;you can only make these security settings on the CMS Hub. We however, don't use the CMS Hub, but we do use the landingpages.&lt;/P&gt;&lt;P data-unlink="true"&gt;And in my opinion landingpages can be extra vulnerable since they always ask for information from the visitor.&lt;/P&gt;&lt;P data-unlink="true"&gt;Will it be added as an option? Or as a basic setting? Otherwise we will be forced to move our landingpages away from Hubspot.&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Best regards,&lt;/P&gt;&lt;P data-unlink="true"&gt;Marc&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 14:41:54 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/744007#M32389</guid>
      <dc:creator>MJanson</dc:creator>
      <dc:date>2023-01-19T14:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Continued security weaknesses being ignored by Hubspot</title>
      <link>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/906823#M37477</link>
      <description>&lt;P&gt;2024 and this is still an issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2024 11:25:25 GMT</pubDate>
      <guid>https://community.hubspot.com/t5/CMS-Development/Continued-security-weaknesses-being-ignored-by-Hubspot/m-p/906823#M37477</guid>
      <dc:creator>Jbads</dc:creator>
      <dc:date>2024-01-17T11:25:25Z</dc:date>
    </item>
  </channel>
</rss>

