Path: blob/main/files/en-us/web/http/headers/content-security-policy/object-src/index.md
6532 views
------{{HTTPSidebar}}
The HTTP {{HTTPHeader("Content-Security-Policy")}} object-src directive specifies valid sources for the {{HTMLElement("object")}}, {{HTMLElement("embed")}}, and {{HTMLElement("applet")}} elements.
To set allowed types for {{HTMLElement("object")}}, {{HTMLElement("embed")}}, and {{HTMLElement("applet")}} elements, use the {{CSP("plugin-types")}} directive.
Note: Elements controlled by
object-srcare perhaps coincidentally considered legacy HTML elements and aren't receiving new standardized features (such as the security attributessandboxorallowfor<iframe>). Therefore it is recommended to restrict this fetch-directive (e.g. explicitly setobject-src 'none'if possible).
| CSP version | 1 |
|---|---|
| Directive type | {{Glossary("Fetch directive")}} |
| {{CSP("default-src")}} fallback |
Yes. If this directive is absent, the user agent will look for the
default-src directive.
|
Syntax
One or more sources can be allowed for the object-src policy:
Sources
<source> can be any one of the values listed in CSP Source Values.
Note that this same set of values can be used in all {{Glossary("fetch directive", "fetch directives")}} (and a number of other directives).
Examples
Violation cases
Given this CSP header:
The following {{HTMLElement("object")}}, {{HTMLElement("embed")}}, and {{HTMLElement("applet")}} elements are blocked and won't load:
Specifications
{{Specifications}}
Browser compatibility
{{Compat}}
See also
{{HTTPHeader("Content-Security-Policy")}}
{{HTMLElement("object")}}, {{HTMLElement("embed")}}, and {{HTMLElement("applet")}}
{{CSP("plugin-types")}}