OWASP ZAP - klmaccounting.com

Generated on Sat, 12 Aug 2023 03:28:10 ZAP Version: 2.13.0

Most Severe Alert
Medium

Most Common Bug
Absence of Anti-CSRF Tokens (215)

Vulnerability Impact

Vulnerability Descriptions
# Name Impact
1 Absence of Anti-CSRF Tokens [1] [2]
No Anti-CSRF tokens were found in a HTML submission form.
2 Content Security Policy (CSP) Header Not Set [1] [2] [3] [4] [5] [6] [7]
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
3 HTTP to HTTPS Insecure Transition in Form Post
This check looks for insecure HTTP pages that host HTTPS forms. The issue is that an insecure HTTP page can easily be hijacked through MITM and the secure HTTPS form can be replaced or spoofed.
4 Big Redirect Detected (Potential Sensitive Information Leak)
The server has responded with a redirect that seems to provide a large response. This may indicate that although the server sent a redirect it also responded with body content (which may include sensitive details, PII, etc.).
5 Cookie No HttpOnly Flag [1]
A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible.
6 Cookie without SameSite Attribute [1]
A cookie has been set without the SameSite attribute, which means that the cookie can be sent as a result of a 'cross-site' request. The SameSite attribute is an effective counter measure to cross-site request forgery, cross-site script inclusion, and timing attacks.
7 Cross-Domain JavaScript Source File Inclusion
The page includes one or more script files from a third-party domain.
8 Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) [1] [2]
The web/application server is leaking information via one or more "X-Powered-By" HTTP response headers. Access to such information may facilitate attackers identifying other frameworks/components your web application is reliant upon and the vulnerabilities such components may be subject to.
9 Timestamp Disclosure - Unix [1]
A timestamp was disclosed by the application/web server - Unix
10 X-Content-Type-Options Header Missing [1] [2]
The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.
11 Information Disclosure - Suspicious Comments
The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.
12 Modern Web Application
The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.
13 Session Management Response Identified [1]
The given response has been identified as containing a session management token. The 'Other Info' field contains a set of header tokens that can be used in the Header Based Session Management Method. If the request is in a context which has a Session Management Method set to "Auto-Detect" then this rule will change the session management to use the tokens identified.