Risk Level | Number of Alerts |
---|---|
High
|
0
|
Medium
|
2
|
Low
|
2
|
Informational
|
3
|
False Positives:
|
0
|
Name | Risk Level | Number of Instances |
---|---|---|
Content Security Policy (CSP) Header Not Set | Medium | 5 |
Proxy Disclosure | Medium | 16 |
Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) | Low | 16 |
Timestamp Disclosure - Unix | Low | 332 |
Information Disclosure - Suspicious Comments | Informational | 5 |
Re-examine Cache-control Directives | Informational | 4 |
User Agent Fuzzer | Informational | 14 |
Medium |
Content Security Policy (CSP) Header Not Set |
---|---|
Description |
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
|
URL | https://v4beta.lolagrove.com |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/ |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/MaterialIcons-Regular.cff684e59ffb052d72cb.woff2 |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/robots.txt |
Method | GET |
Parameter | |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | |
Attack | |
Evidence | |
Instances | 5 |
Solution |
Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header, to achieve optimal browser support: "Content-Security-Policy" for Chrome 25+, Firefox 23+ and Safari 7+, "X-Content-Security-Policy" for Firefox 4.0+ and Internet Explorer 10+, and "X-WebKit-CSP" for Chrome 14+ and Safari 6+.
|
Reference |
https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policy
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html http://www.w3.org/TR/CSP/ http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html http://www.html5rocks.com/en/tutorials/security/content-security-policy/ http://caniuse.com/#feat=contentsecuritypolicy http://content-security-policy.com/ |
CWE Id | 693 |
WASC Id | 15 |
Plugin Id | 10038 |
Medium |
Proxy Disclosure |
---|---|
Description |
1 proxy server(s) were detected or fingerprinted. This information helps a potential attacker to determine
- A list of targets for an attack against the application.
- Potential vulnerabilities on the proxy servers that service the application.
- The presence or absence of any proxy-based components that might cause attacks against the application to be detected, prevented, or mitigated.
|
URL | https://v4beta.lolagrove.com |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/ |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/5-es2015.f3ddcc52aff14d871f76.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images/login-logo.png |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/favicon.ico |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/main-es2015.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/main-es5.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/MaterialIcons-Regular.83bebaf37c09c7e1c3ee.woff |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/MaterialIcons-Regular.cff684e59ffb052d72cb.woff2 |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/polyfills-es2015.420b64511fc607e3df0c.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/polyfills-es5.71bdc9703649c942234f.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/runtime-es2015.bce4c556fa754832f897.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/runtime-es5.bce4c556fa754832f897.js |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
URL | https://v4beta.lolagrove.com/styles.a2d3ab10e0255c94ced7.css |
Method | GET |
Parameter | |
Attack | TRACE, OPTIONS methods with 'Max-Forwards' header. TRACK method. |
Evidence | |
Instances | 16 |
Solution |
Disable the 'TRACE' method on the proxy servers, as well as the origin web/application server.
Disable the 'OPTIONS' method on the proxy servers, as well as the origin web/application server, if it is not required for other purposes, such as 'CORS' (Cross Origin Resource Sharing).
Configure the web and application servers with custom error pages, to prevent 'fingerprintable' product-specific error pages being leaked to the user in the event of HTTP errors, such as 'TRACK' requests for non-existent pages.
Configure all proxies, application servers, and web servers to prevent disclosure of the technology and version information in the 'Server' and 'X-Powered-By' HTTP response headers.
|
Reference | https://tools.ietf.org/html/rfc7231#section-5.1.2 |
CWE Id | 200 |
WASC Id | 45 |
Plugin Id | 40025 |
Low |
Server Leaks Information via "X-Powered-By" HTTP Response Header Field(s) |
---|---|
Description |
The web/application server is leaking information via one or more "X-Powered-By" HTTP response headers. Access to such information may facilitate attackers identifying other frameworks/components your web application is reliant upon and the vulnerabilities such components may be subject to.
|
URL | https://v4beta.lolagrove.com |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/ |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/5-es2015.f3ddcc52aff14d871f76.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/assets/Images/login-logo.png |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/favicon.ico |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/main-es2015.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/main-es5.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/MaterialIcons-Regular.83bebaf37c09c7e1c3ee.woff |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/MaterialIcons-Regular.cff684e59ffb052d72cb.woff2 |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/polyfills-es2015.420b64511fc607e3df0c.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/polyfills-es5.71bdc9703649c942234f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/robots.txt |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/runtime-es2015.bce4c556fa754832f897.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/runtime-es5.bce4c556fa754832f897.js |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
URL | https://v4beta.lolagrove.com/styles.a2d3ab10e0255c94ced7.css |
Method | GET |
Parameter | |
Attack | |
Evidence | X-Powered-By: ASP.NET |
Instances | 16 |
Solution |
Ensure that your web server, application server, load balancer, etc. is configured to suppress "X-Powered-By" headers.
|
Reference |
http://blogs.msdn.com/b/varunm/archive/2013/04/23/remove-unwanted-http-response-headers.aspx
http://www.troyhunt.com/2012/02/shhh-dont-let-your-response-headers.html |
CWE Id | 200 |
WASC Id | 13 |
Plugin Id | 10037 |
Informational |
Information Disclosure - Suspicious Comments |
---|---|
Description |
The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.
|
URL | https://v4beta.lolagrove.com/5-es2015.f3ddcc52aff14d871f76.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Db |
URL | https://v4beta.lolagrove.com/main-es2015.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | TODO |
URL | https://v4beta.lolagrove.com/main-es5.4cb66825c5b639b7257a.js |
Method | GET |
Parameter | |
Attack | |
Evidence | TODO |
URL | https://v4beta.lolagrove.com/polyfills-es2015.420b64511fc607e3df0c.js |
Method | GET |
Parameter | |
Attack | |
Evidence | select |
URL | https://v4beta.lolagrove.com/polyfills-es5.71bdc9703649c942234f.js |
Method | GET |
Parameter | |
Attack | |
Evidence | Select |
Instances | 5 |
Solution |
Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.
|
Reference | |
CWE Id | 200 |
WASC Id | 13 |
Plugin Id | 10027 |
Informational |
Re-examine Cache-control Directives |
---|---|
Description |
The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content. For static assets like css, js, or image files this might be intended, however, the resources should be reviewed to ensure that no sensitive content will be cached.
|
URL | https://v4beta.lolagrove.com |
Method | GET |
Parameter | Cache-Control |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/ |
Method | GET |
Parameter | Cache-Control |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/robots.txt |
Method | GET |
Parameter | Cache-Control |
Attack | |
Evidence | |
URL | https://v4beta.lolagrove.com/sitemap.xml |
Method | GET |
Parameter | Cache-Control |
Attack | |
Evidence | |
Instances | 4 |
Solution |
For secure content, ensure the cache-control HTTP header is set with "no-cache, no-store, must-revalidate". If an asset should be cached consider setting the directives "public, max-age, immutable".
|
Reference |
https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#web-content-caching
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cache-Control |
CWE Id | 525 |
WASC Id | 13 |
Plugin Id | 10015 |
Informational |
User Agent Fuzzer |
---|---|
Description |
Check for differences in response based on fuzzed User Agent (eg. mobile sites, access as a Search Engine Crawler). Compares the response statuscode and the hashcode of the response body with the original response.
|
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence | |
URL | https://v4beta.lolagrove.com/assets |
Method | GET |
Parameter | Header User-Agent |
Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (compatible; Yahoo! Slurp; http://help.yahoo.com/help/us/ysearch/slurp) |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | Mozilla/5.0 (iPhone; U; CPU iPhone OS 3_0 like Mac OS X; en-us) AppleWebKit/528.18 (KHTML, like Gecko) Version/4.0 Mobile/7A341 Safari/528.16 |
Evidence | |
URL | https://v4beta.lolagrove.com/assets/Images |
Method | GET |
Parameter | Header User-Agent |
Attack | msnbot/1.1 (+http://search.msn.com/msnbot.htm) |
Evidence | |
Instances | 14 |
Solution | |
Reference | https://owasp.org/wstg |
CWE Id | |
WASC Id | |
Plugin Id | 10104 |