Multiple Fallbacks Demonstration

Third-party domains misuse fallback behavior to gain unintended privileges

Content Security Policy

The policy applied to this page is:

default-src 'self' https:;
style-src 'self';
      

Attack

This page allows script loading from tracker-script.pages.dev only through default-src fallback. It does not define frame-src or worker-src, so those fall back to the same permissive rule.

The script domain loads:

Flow Summary
tracker-script.pages.dev → Loads a visible script (legitimate)
tracker-script.pages.devInjects iframe from tracker2.pages.dev (via frame-src → default-src)
tracker-script.pages.devStarts Web Worker from tracker2.pages.dev (via worker-src → default-src)

This demonstrates how multiple third-party roles are collapsed when CSP directives are omitted, granting unintended execution power via fallback.