Medium (Medium) | CSP: script-src unsafe-inline |
Description | script-src includes unsafe-inline. |
|
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
Instances | 3 |
Solution | Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header. |
Reference | http://www.w3.org/TR/CSP2/ http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
CWE Id | 16 |
WASC Id | 15 |
Source ID | 3 |
Medium (Medium) | CSP: style-src unsafe-inline |
Description | style-src includes unsafe-inline. |
|
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
Instances | 3 |
Solution | Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header. |
Reference | http://www.w3.org/TR/CSP2/ http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
CWE Id | 16 |
WASC Id | 15 |
Source ID | 3 |
Medium (Medium) | CSP: Wildcard Directive |
Description | The following directives either allow wildcard sources (or ancestors), are not defined, or are overly broadly defined: frame-ancestors, form-action The directive(s): frame-ancestors, form-action are among the directives that do not fallback to default-src, missing/excluding them is the same as allowing anything. |
|
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
URL | https://v3.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | Content-Security-Policy |
Evidence | default-src https: 'unsafe-inline' 'unsafe-eval';img-src 'self' https: data:; |
Instances | 3 |
Solution | Ensure that your web server, application server, load balancer, etc. is properly configured to set the Content-Security-Policy header. |
Reference | http://www.w3.org/TR/CSP2/ http://www.w3.org/TR/CSP/ http://caniuse.com/#search=content+security+policy http://content-security-policy.com/ https://github.com/shapesecurity/salvation https://developers.google.com/web/fundamentals/security/csp#policy_applies_to_a_wide_variety_of_resources |
CWE Id | 16 |
WASC Id | 15 |
Source ID | 3 |
Low (Medium) | Cookie No HttpOnly Flag |
Description | A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible. |
|
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | ApplicationGatewayAffinityCORS |
Evidence | Set-Cookie: ApplicationGatewayAffinityCORS |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | ApplicationGatewayAffinityCORS |
Evidence | Set-Cookie: ApplicationGatewayAffinityCORS |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
Instances | 4 |
Solution | Ensure that the HttpOnly flag is set for all cookies. |
Reference | https://owasp.org/www-community/HttpOnly |
CWE Id | 16 |
WASC Id | 13 |
Source ID | 3 |
Low (Medium) | Cookie Without SameSite Attribute |
Description | A cookie has been set with an invalid SameSite attribute value, which means that the cookie can be sent as a result of a 'cross-site' request. The SameSite attribute is an effective counter measure to cross-site request forgery, cross-site script inclusion, and timing attacks. |
|
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | ApplicationGatewayAffinityCORS |
Evidence | Set-Cookie: ApplicationGatewayAffinityCORS |
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | ApplicationGatewayAffinityCORS |
Evidence | Set-Cookie: ApplicationGatewayAffinityCORS |
Instances | 4 |
Solution | Ensure that the SameSite attribute is set to either 'lax' or ideally 'strict' for all cookies. |
Reference | https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site |
CWE Id | 16 |
WASC Id | 13 |
Source ID | 3 |
Low (Medium) | Cookie Without Secure Flag |
Description | A cookie has been set without the secure flag, which means that the cookie can be accessed via unencrypted connections. |
|
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Parameter | ApplicationGatewayAffinity |
Evidence | Set-Cookie: ApplicationGatewayAffinity |
Instances | 2 |
Solution | Whenever a cookie contains sensitive information or is a session token, then it should always be passed using an encrypted channel. Ensure that the secure flag is set for cookies containing such sensitive information. |
Reference | https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/06-Session_Management_Testing/02-Testing_for_Cookies_Attributes.html |
CWE Id | 614 |
WASC Id | 13 |
Source ID | 3 |
Low (Medium) | Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) |
Description | The web/application server is leaking information via one or more "X-Powered-By" HTTP response headers. Access to such information may facilitate attackers identifying other frameworks/components your web application is reliant upon and the vulnerabilities such components may be subject to. |
|
URL | https://v3.lolagrove.com/favicon.ico |
Method | GET |
Evidence | X-Powered-By: LOLAGROVE(3.4.6976.22064) |
URL | https://v3.lolagrove.com/sitemap.xml |
Method | GET |
Evidence | X-Powered-By: LOLAGROVE(3.4.6976.22064) |
URL | https://v3.lolagrove.com/data.ashx?id=52714.14891 |
Method | GET |
Evidence | X-Powered-By: LOLAGROVE(3.4.6976.22064) |
URL | https://v3.lolagrove.com/robots.txt |
Method | GET |
Evidence | X-Powered-By: LOLAGROVE(3.4.6976.22064) |
Instances | 4 |
Solution | Ensure that your web server, application server, load balancer, etc. is configured to suppress "X-Powered-By" headers. |
Reference | http://blogs.msdn.com/b/varunm/archive/2013/04/23/remove-unwanted-http-response-headers.aspx http://www.troyhunt.com/2012/02/shhh-dont-let-your-response-headers.html |
CWE Id | 200 |
WASC Id | 13 |
Source ID | 3 |