Summary #

Invicti identified that the nonce used remained same for subsequent responses.

Impact #

An attacker can carry out a successful Cross-site Scripting attack by using this nonce.

Remediation #

The application must generate a fresh value for the nonce-value directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.

Classifications #
CWE-16; ISO27001-A.14.2.5; WASC-15; OWASP 2013-A5; OWASP 2017-A6

Dead accurate, fast & easy-to-use Web Application Security Scanner

Get a demo