# | Name | Impact |
---|---|---|
1 | Absence of Anti-CSRF Tokens [1] [2] |
No Anti-CSRF tokens were found in a HTML submission form.
|
2 | Content Security Policy (CSP) Header Not Set [1] [2] [3] [4] [5] [6] [7] |
Content Security Policy (CSP) is an added layer of
security that helps to detect and mitigate certain types of attacks,
including Cross Site Scripting (XSS) and data injection attacks. These
attacks are used for everything from data theft to site defacement or
distribution of malware. CSP provides a set of standard HTTP headers
that allow website owners to declare approved sources of content that
browsers should be allowed to load on that page — covered types are
JavaScript, CSS, HTML frames, fonts, images and embeddable objects such
as Java applets, ActiveX, audio and video files.
|
3 | HTTP to HTTPS Insecure Transition in Form Post |
This check looks for insecure HTTP pages that host HTTPS
forms. The issue is that an insecure HTTP page can easily be hijacked
through MITM and the secure HTTPS form can be replaced or spoofed.
|
4 | Big Redirect Detected (Potential Sensitive Information Leak) |
The server has responded with a redirect that seems to
provide a large response. This may indicate that although the server
sent a redirect it also responded with body content (which may include
sensitive details, PII, etc.).
|
5 | Cookie No HttpOnly Flag [1] |
A cookie has been set without the HttpOnly flag, which
means that the cookie can be accessed by JavaScript. If a malicious
script can be run on this page then the cookie will be accessible and
can be transmitted to another site. If this is a session cookie then
session hijacking may be possible.
|
6 | Cookie without SameSite Attribute [1] |
A cookie has been set without the SameSite attribute,
which means that the cookie can be sent as a result of a 'cross-site'
request. The SameSite attribute is an effective counter measure to
cross-site request forgery, cross-site script inclusion, and timing
attacks.
|
7 | Cross-Domain JavaScript Source File Inclusion |
The page includes one or more script files from a third-party domain.
|
8 | Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [1] [2] |
The web/application server is leaking information via one
or more "X-Powered-By" HTTP response headers. Access to such
information may facilitate attackers identifying other
frameworks/components your web application is reliant upon and the
vulnerabilities such components may be subject to.
|
9 | Timestamp Disclosure - Unix [1] |
A timestamp was disclosed by the application/web server - Unix
|
10 | X-Content-Type-Options Header Missing [1] [2] |
The Anti-MIME-Sniffing header X-Content-Type-Options was
not set to 'nosniff'. This allows older versions of Internet Explorer
and Chrome to perform MIME-sniffing on the response body, potentially
causing the response body to be interpreted and displayed as a content
type other than the declared content type. Current (early 2014) and
legacy versions of Firefox will use the declared content type (if one is
set), rather than performing MIME-sniffing.
|
11 | Information Disclosure - Suspicious Comments |
The response appears to contain suspicious comments which
may help an attacker. Note: Matches made within script blocks or files
are against the entire content not only comments.
|
12 | Modern Web Application |
The application appears to be a modern web application.
If you need to explore it automatically then the Ajax Spider may well be
more effective than the standard one.
|
13 | Session Management Response Identified [1] |
The given response has been identified as containing a
session management token. The 'Other Info' field contains a set of
header tokens that can be used in the Header Based Session Management
Method. If the request is in a context which has a Session Management
Method set to "Auto-Detect" then this rule will change the session
management to use the tokens identified.
|