Summary #

Netsparker identified that the nonce used remained same for subsequent responses.

Impact #

An attacker can carry out a successful Cross-site Scripting attack by using this nonce.

Remediation #

The application must generate a fresh value for the nonce-value directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.

Classifications #
CWE-16, ISO27001-A.14.2.5, WASC-15, OWASP 2013-A5, OWASP 2017-A6
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO