CWE-16
ISO27001-A.14.2.5
OWASP 2013-A5
OWASP 2017-A6
WASC-15

Static Nonce Identified in Content Security Policy (CSP)

Severity:
Information
Summary

Invicti identified that the nonce used remained same for subsequent responses.

Impact

An attacker can carry out a successful Cross-site Scripting attack by using this nonce.

Remediation

The application must generate a fresh value for the nonce-value directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding