This is a Burp plugin that is designed to passively scan for CSP headers that contain known bypasses as well as other potential weaknesses.
- Download the latest Jython 2.7.x .jar file
- In Burp select
Extenderand then theOptionstab, under the Python Environment heading clickSelect File ...and browse to the Jython .jar file
- Execute the
build-plugin.shscript, you should see acsp-bypass-plugin.pyfile appear - In Burp select
Extenderand then theExtensionstab - Click
Addin the window that appears, selectPythonfrom theExtension Typedropdown menu - Click
Select File ...next toExtension Fileand select the generatedcsp-bypass-plugin.pyfile - Click
Nextand you're done!
