Summary

Netsparker identified that the nonce used remained same for subsequent responses.

Impact

An attacker can carry out a successful Cross-site Scripting attack by using this nonce.

Remediation

The application must generate a fresh value for the nonce-value directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.

Classifications
OWASP 2013-A5
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO