Extends collective.portlet.embed changing the portlet behavior. If an opt-out cookie (or a DNS header) is present and the portlet is rendering externas resources, do not render the portlet.
Simply adding this add-on in your buildout will change all of the collective.portlet.embed instances as follow: if...
- a cookie named
embed-optout
is present with valuetrue
, or - the
DNT
(Do Not Track) header is set
...the portlet content is parsed looking for potentially malicious contents. If contents that load external sites are found, the portlet will not be rendered.
URLs in the same subdomain (aaa.bar.com that load from bbb.bar.com) are permitted and HTTP ports are ignored.
Tricks to overtake the security check are many.
A malicious portlet creator always can (for example)
put in the portlet a JavaScript that create an iframe
that load external contents and the
security check will not be able to find it.
Developed with the support of Regione Emilia Romagna; Regione Emilia Romagna supports the PloneGov initiative.
This product was developed by RedTurtle Technology team.