|
Medium |
Content Security Policy (CSP) Header Not Set |
| Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
|
| URL |
http://www.vulnweb.com |
| Method |
GET |
| Parameter |
|
| Attack |
|
| Evidence |
|
|
|
|
| Request Header
- size: 205 bytes.
|
GET http://www.vulnweb.com HTTP/1.1
Host: www.vulnweb.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; x64; rv:105.0esr) Gecko/20010101 Firefox/105.0esr
Pragma: no-cache
Cache-Control: no-cache
|
| Request Body
- size: 0 bytes.
|
|
| Response Header
- size: 239 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:31:55 GMT
Content-Type: text/html
Content-Length: 4018
Last-Modified: Tue, 28 Jul 2020 09:20:49 GMT
Connection: keep-alive
ETag: "5f1fedf1-fb2"
Accept-Ranges: bytes
|
| Response Body
- size: 4,018 bytes.
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Acunetix Web Vulnerability Scanner - Test websites</title>
<style type="text/css">
<!--
@import url("style.css");
-->
</style>
</head>
<body>
<center>
<br>
<a href='https://www.acunetix.com/'><img src='acunetix-logo.png' border='0' alt="Acunetix website security"></a><br><br>
<div>Vulnerable test websites for <a href='https://www.acunetix.com/vulnerability-scanner/'>Acunetix Web Vulnerability Scanner</a>.</div>
<table id="one-column-emphasis" summary="Acunetix test websites" style="width:60%">
<colgroup>
<col>
</colgroup>
<thead>
<tr style="font-size:14px">
<th scope="col"><b>Name</b></th>
<th scope="col"><b>URL</b></th>
<th scope="col"><b>Technologies</b></th>
<th scope="col"><b>Resources</b></th>
</tr>
</thead>
<tbody>
<tr style="font-size:14px">
<td>SecurityTweets</td>
<td><a href='http://testhtml5.vulnweb.com/'>http://testhtml5.vulnweb.com</a></td>
<td>nginx, Python, Flask, CouchDB</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/html5-website-security/'>Review</a> Acunetix HTML5 scanner or <a href='https://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acuart</td>
<td><a href='http://testphp.vulnweb.com/'>http://testphp.vulnweb.com</a></td>
<td>Apache, PHP, MySQL</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/php-security-scanner/'>Review</a> Acunetix PHP scanner or <a href='https://www.acunetix.com/blog/articles/prevent-sql-injection-vulnerabilities-in-php-applications/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acuforum</td>
<td><a href='http://testasp.vulnweb.com/'>http://testasp.vulnweb.com</a></td>
<td>IIS, ASP, Microsoft SQL Server</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/sql-injection/'>Review</a> Acunetix SQL scanner or <a href='https://www.acunetix.com/websitesecurity/sql-injection/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acublog</td>
<td><a href='http://testaspnet.vulnweb.com/'>http://testaspnet.vulnweb.com</a></td>
<td>IIS, ASP.NET, Microsoft SQL Server</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/network-vulnerability-scanner/'>Review</a> Acunetix network scanner or <a href='https://www.acunetix.com/blog/articles/network-vulnerability-assessment-gotchas-avoid/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>REST API</td>
<td><a href='http://rest.vulnweb.com/'>http://rest.vulnweb.com/</a></td>
<td>Apache, PHP, MySQL</td>
<td><a href='https://www.acunetix.com/blog/articles/rest-api-security-testing-acunetix/'>Review</a> Acunetix scanner or <a href='https://www.acunetix.com/blog/articles/rest-api-security-testing-acunetix/'>learn more</a> on the topic.</td>
</tr>
</tbody>
</table>
<div style="background-color:lightgray;width:60%;text-align:center;font-size:14px">
<p style="padding-left:140px;padding-right:140px"><b>Warning</b>: This site hosts intentionally vulnerable web applications. You can use these applications to understand how programming and configuration errors lead to security breaches. We created the site to help you test Acunetix but you may also use it for manual penetration testing or for educational purposes. It will help you learn about vulnerabilities such as SQL Injection, Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF), and many more.</p>
</div>
</center>
</body>
</html>
|
| URL |
http://www.vulnweb.com/ |
| Method |
GET |
| Parameter |
|
| Attack |
|
| Evidence |
|
|
|
|
| Request Header
- size: 206 bytes.
|
GET http://www.vulnweb.com/ HTTP/1.1
Host: www.vulnweb.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; x64; rv:105.0esr) Gecko/20010101 Firefox/105.0esr
Pragma: no-cache
Cache-Control: no-cache
|
| Request Body
- size: 0 bytes.
|
|
| Response Header
- size: 239 bytes.
|
HTTP/1.1 200 OK
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:31:55 GMT
Content-Type: text/html
Content-Length: 4018
Last-Modified: Tue, 28 Jul 2020 09:20:49 GMT
Connection: keep-alive
ETag: "5f1fedf1-fb2"
Accept-Ranges: bytes
|
| Response Body
- size: 4,018 bytes.
|
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Acunetix Web Vulnerability Scanner - Test websites</title>
<style type="text/css">
<!--
@import url("style.css");
-->
</style>
</head>
<body>
<center>
<br>
<a href='https://www.acunetix.com/'><img src='acunetix-logo.png' border='0' alt="Acunetix website security"></a><br><br>
<div>Vulnerable test websites for <a href='https://www.acunetix.com/vulnerability-scanner/'>Acunetix Web Vulnerability Scanner</a>.</div>
<table id="one-column-emphasis" summary="Acunetix test websites" style="width:60%">
<colgroup>
<col>
</colgroup>
<thead>
<tr style="font-size:14px">
<th scope="col"><b>Name</b></th>
<th scope="col"><b>URL</b></th>
<th scope="col"><b>Technologies</b></th>
<th scope="col"><b>Resources</b></th>
</tr>
</thead>
<tbody>
<tr style="font-size:14px">
<td>SecurityTweets</td>
<td><a href='http://testhtml5.vulnweb.com/'>http://testhtml5.vulnweb.com</a></td>
<td>nginx, Python, Flask, CouchDB</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/html5-website-security/'>Review</a> Acunetix HTML5 scanner or <a href='https://www.acunetix.com/vulnerability-scanner/crawling-html5-javascript-websites/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acuart</td>
<td><a href='http://testphp.vulnweb.com/'>http://testphp.vulnweb.com</a></td>
<td>Apache, PHP, MySQL</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/php-security-scanner/'>Review</a> Acunetix PHP scanner or <a href='https://www.acunetix.com/blog/articles/prevent-sql-injection-vulnerabilities-in-php-applications/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acuforum</td>
<td><a href='http://testasp.vulnweb.com/'>http://testasp.vulnweb.com</a></td>
<td>IIS, ASP, Microsoft SQL Server</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/sql-injection/'>Review</a> Acunetix SQL scanner or <a href='https://www.acunetix.com/websitesecurity/sql-injection/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>Acublog</td>
<td><a href='http://testaspnet.vulnweb.com/'>http://testaspnet.vulnweb.com</a></td>
<td>IIS, ASP.NET, Microsoft SQL Server</td>
<td><a href='https://www.acunetix.com/vulnerability-scanner/network-vulnerability-scanner/'>Review</a> Acunetix network scanner or <a href='https://www.acunetix.com/blog/articles/network-vulnerability-assessment-gotchas-avoid/'>learn more</a> on the topic.</td>
</tr>
<tr style="font-size:14px">
<td>REST API</td>
<td><a href='http://rest.vulnweb.com/'>http://rest.vulnweb.com/</a></td>
<td>Apache, PHP, MySQL</td>
<td><a href='https://www.acunetix.com/blog/articles/rest-api-security-testing-acunetix/'>Review</a> Acunetix scanner or <a href='https://www.acunetix.com/blog/articles/rest-api-security-testing-acunetix/'>learn more</a> on the topic.</td>
</tr>
</tbody>
</table>
<div style="background-color:lightgray;width:60%;text-align:center;font-size:14px">
<p style="padding-left:140px;padding-right:140px"><b>Warning</b>: This site hosts intentionally vulnerable web applications. You can use these applications to understand how programming and configuration errors lead to security breaches. We created the site to help you test Acunetix but you may also use it for manual penetration testing or for educational purposes. It will help you learn about vulnerabilities such as SQL Injection, Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF), and many more.</p>
</div>
</center>
</body>
</html>
|
| URL |
http://www.vulnweb.com/favicon.ico |
| Method |
GET |
| Parameter |
|
| Attack |
|
| Evidence |
|
|
|
|
| Request Header
- size: 294 bytes.
|
GET http://www.vulnweb.com/favicon.ico HTTP/1.1
Host: www.vulnweb.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:108.0) Gecko/20100101 Firefox/108.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Connection: keep-alive
Referer: http://www.vulnweb.com/
|
| Request Body
- size: 0 bytes.
|
|
| Response Header
- size: 155 bytes.
|
HTTP/1.1 404 Not Found
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:32:03 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
| Response Body
- size: 153 bytes.
|
<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
| URL |
http://www.vulnweb.com/robots.txt |
| Method |
GET |
| Parameter |
|
| Attack |
|
| Evidence |
|
|
|
|
| Request Header
- size: 216 bytes.
|
GET http://www.vulnweb.com/robots.txt HTTP/1.1
Host: www.vulnweb.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; x64; rv:105.0esr) Gecko/20010101 Firefox/105.0esr
Pragma: no-cache
Cache-Control: no-cache
|
| Request Body
- size: 0 bytes.
|
|
| Response Header
- size: 155 bytes.
|
HTTP/1.1 404 Not Found
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:31:55 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
| Response Body
- size: 153 bytes.
|
<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
| URL |
http://www.vulnweb.com/sitemap.xml |
| Method |
GET |
| Parameter |
|
| Attack |
|
| Evidence |
|
|
|
|
| Request Header
- size: 217 bytes.
|
GET http://www.vulnweb.com/sitemap.xml HTTP/1.1
Host: www.vulnweb.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; x64; rv:105.0esr) Gecko/20010101 Firefox/105.0esr
Pragma: no-cache
Cache-Control: no-cache
|
| Request Body
- size: 0 bytes.
|
|
| Response Header
- size: 155 bytes.
|
HTTP/1.1 404 Not Found
Server: nginx/1.19.0
Date: Wed, 14 Dec 2022 06:31:55 GMT
Content-Type: text/html
Content-Length: 153
Connection: keep-alive
|
| Response Body
- size: 153 bytes.
|
<html>
<head><title>404 Not Found</title></head>
<body>
<center><h1>404 Not Found</h1></center>
<hr><center>nginx/1.19.0</center>
</body>
</html>
|
| Instances |
5 |
| Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header, to achieve optimal browser support: "Content-Security-Policy" for Chrome 25+, Firefox 23+ and Safari 7+, "X-Content-Security-Policy" for Firefox 4.0+ and Internet Explorer 10+, and "X-WebKit-CSP" for Chrome 14+ and Safari 6+.
|
| Reference |
https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
http://www.w3.org/TR/CSP/
http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html
http://www.html5rocks.com/en/tutorials/security/content-security-policy/
http://caniuse.com/#feat=contentsecuritypolicy
http://content-security-policy.com/
|
| Tags |
OWASP_2021_A05
OWASP_2017_A06
|
| CWE Id |
693 |
| WASC Id |
15 |
| Plugin Id |
10038 |