Summary

Netsparker detected that a weak nonce value used in CSP declaration.

Impact

An attacker can carry out a successful Cross-site Scripting attack by predicting a valid nonce by exploiting this weakness.

Remediation

The application must generate a fresh value for the nonce-value directive at random and independently each time it transmits a policy. The value should be at least 128 bits long and should be generated using a cryptographically secure random number generator.

Classifications
OWASP 2013-A5
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

Select Category

OR

Search Vulnerability

Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO