Uploaded image for project: 'Project Simple'
  1. Project Simple
  2. ST-129

MISSING CROSS-SITE SCRIPTING PROTECTION HEADERS

    Details

    • Type: Change Request
    • Status: Closed
    • Priority: Medium
    • Resolution: Done
    • Component/s: None
    • Labels:
    • Module:
      BenAdmin - Security
    • Reported by:
      Support
    • Item State:
      Production Complete - Closed
    • Issue Importance:
      Must Have
    • Sprint:
      ST Sprint 2

      Description

      Vulnerability Description
      Cross-site scripting (XSS) filters included in modern browsers check if the URL contains harmful XSS payloads and determine if they can be reflected in the response page. If such a condition is identified, the injected code is modified in such a way to protect against an XSS attack. The application does not set appropriate headers to ensure use of these protections.

      Impact
      Without the appropriate header set by the application, browsers use default-configured behavior – which may not include additional XSS protections. If a user disables a browser’s built-in XSS filter protection, and the application does not set the appropriate header, a single line of defense against XSS attacks has been removed. Reducing the layers of protection can aid an attacker in executing an attack that may permit a wide variety of actions, such as stealing the victim's session token or login credentials.

      Verification and Attack Information
      Praetorian identified this issue by reviewing HTTP headers during regular use of the application. The X-XSS-Protection header is not included in server response headers.

      Recommendation
      As a means to provide a defense in-depth strategy against XSS attacks, the following header should be sent with each response to re-enable browser protections for the particular page in case it was disabled by the user:

      X-XSS-Protection: 1; mode=block

      This configuration enables XSS browser filters and instructs the user agent to block the response in the event that script has been inserted from user input, instead of sanitizing.
      The downside of these filters is that the browser is not capable of distinguishing between code fragments that were reflected by a vulnerable web application in an XSS attack and those that are already present on the page.
      In addition, it must be strongly emphasized that correctly setting this header should not be viewed as the only or main means for preventing XSS attacks. The filters that these headers enable should be seen as part of a defense in depth strategy to protect against XSS attacks, and correctly enabling them is considered best practice.

      References
      http://www.owasp.org/index.php/Cross-site_Scripting_(XSS) http://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet https://www.owasp.org/index.php/List_of_useful_HTTP_headers

        Attachments

          Activity

          vijayendra Vijayendra Shinde (Inactive) created issue -
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Field Original Value New Value
          Status New Request [ 10029 ] Pending for Approval [ 10002 ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Status Pending for Approval [ 10002 ] Approved for Development [ 10003 ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Assignee Niteen Surwase [ niteen.surwase ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Sprint ST Sprint 2 [ 4 ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Rank Ranked higher
          Hide
          niteen.surwase Niteen Surwase (Inactive) added a comment -

          HTTP Response Header
          Name : X-XSS-Protection
          Value : 1; mode=block

          For Testing :
          1. Open Login Page --> Inspect Element --> Network Tab --> Reload Page (Ctrl + F5)
          2. Check Response Headers of all files --> X-XSS-Protection attribute is Added.

          Help URL:
          https://www.veracode.com/blog/2014/03/guidelines-for-setting-security-headers
          https://scotthelme.co.uk/hardening-your-http-response-headers/

          Show
          niteen.surwase Niteen Surwase (Inactive) added a comment - HTTP Response Header Name : X-XSS-Protection Value : 1; mode=block For Testing : 1. Open Login Page --> Inspect Element --> Network Tab --> Reload Page (Ctrl + F5) 2. Check Response Headers of all files --> X-XSS-Protection attribute is Added. Help URL: https://www.veracode.com/blog/2014/03/guidelines-for-setting-security-headers https://scotthelme.co.uk/hardening-your-http-response-headers/
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Assignee Niteen Surwase [ niteen.surwase ] Amit Gude [ amitg ]
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Status Approved for Development [ 10003 ] In Development [ 10007 ]
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Status In Development [ 10007 ] Local Testing [ 10200 ]
          Hide
          amitg Amit Gude (Inactive) added a comment -

          Assigning to Zeeshan

          Show
          amitg Amit Gude (Inactive) added a comment - Assigning to Zeeshan
          amitg Amit Gude (Inactive) made changes -
          Assignee Amit Gude [ amitg ] Zeeshan Chishty [ zeeshan.chishty ]
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Verified as X-XSS protection header is set to 1;mode=block

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Verified as X-XSS protection header is set to 1;mode=block
          Zeeshan.Chishty Zeeshan Chishty (Inactive) made changes -
          Status Local Testing [ 10200 ] Pending for Stage Approval [ 10300 ]
          samir Samir made changes -
          Issue Importance Must Have [ 11800 ]
          Zeeshan.Chishty Zeeshan Chishty (Inactive) made changes -
          Assignee Zeeshan Chishty [ zeeshan.chishty ] Niteen Surwase [ niteen.surwase ]
          Zeeshan.Chishty Zeeshan Chishty (Inactive) made changes -
          Labels Security
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Module Parent values: BenAdmin(10100) Parent values: BenAdmin(10100)Level 1 values: Security(10112)
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Item State Parent values: LB QA(10201)Level 1 values: Ready for Stage(10213)
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Status Pending for Stage Approval [ 10300 ] Approved for Stage [ 10030 ]
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Item State Parent values: LB QA(10201)Level 1 values: Ready for Stage(10213) Parent values: Stage QA(10202)Level 1 values: Stage Deployed(11602)
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Assignee Niteen Surwase [ niteen.surwase ] Zeeshan Chishty [ zeeshan.chishty ]
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          Verified on stage as X-XSS protection header is set to 1;mode=block

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - Verified on stage as X-XSS protection header is set to 1;mode=block
          Zeeshan.Chishty Zeeshan Chishty (Inactive) made changes -
          Assignee Zeeshan Chishty [ zeeshan.chishty ] Vijayendra Shinde [ ID10506 ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Status Approved for Stage [ 10030 ] Stage Testing [ 10201 ]
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Item State Parent values: Stage QA(10202)Level 1 values: Stage Deployed(11602) Parent values: Stage QA(10202)Level 1 values: Ready for Production(10217)
          vijayendra Vijayendra Shinde (Inactive) made changes -
          Status Stage Testing [ 10201 ] Pending for Production Approval [ 10301 ]
          rakeshr Rakesh Roy (Inactive) made changes -
          Assignee Vijayendra Shinde [ ID10506 ] Zeeshan Chishty [ zeeshan.chishty ]
          rakeshr Rakesh Roy (Inactive) made changes -
          Developer Niteen Surwase [ niteen.surwase ]
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Status Pending for Production Approval [ 10301 ] Approved for production [ 10034 ]
          niteen.surwase Niteen Surwase (Inactive) made changes -
          Item State Parent values: Stage QA(10202)Level 1 values: Ready for Production(10217) Parent values: Production QA(10203)Level 1 values: Production Deployed(10221)
          Hide
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment -

          x-xss-protection
          1; mode=block header is implemented on Production Server confirmed the same

          Show
          Zeeshan.Chishty Zeeshan Chishty (Inactive) added a comment - x-xss-protection 1; mode=block header is implemented on Production Server confirmed the same
          Zeeshan.Chishty Zeeshan Chishty (Inactive) made changes -
          Assignee Zeeshan Chishty [ zeeshan.chishty ] Deepali Tidke [ deepalit ]
          Hide
          deepalit Deepali Tidke (Inactive) added a comment -

          as discussed with Niteen no functional testing is involved here , can close this ticket.

          Show
          deepalit Deepali Tidke (Inactive) added a comment - as discussed with Niteen no functional testing is involved here , can close this ticket.
          deepalit Deepali Tidke (Inactive) made changes -
          Item State Parent values: Production QA(10203)Level 1 values: Production Deployed(10221) Parent values: Production Complete(10222)Level 1 values: Closed(10223)
          deepalit Deepali Tidke (Inactive) made changes -
          Status Approved for production [ 10034 ] Production Testing [ 10202 ]
          deepalit Deepali Tidke (Inactive) made changes -
          Resolution Fixed [ 1 ]
          Status Production Testing [ 10202 ] Production Complete [ 10028 ]
          deepalit Deepali Tidke (Inactive) made changes -
          Status Production Complete [ 10028 ] Closed [ 6 ]
          Transition Time In Source Status Execution Times
          Vijayendra Shinde (Inactive) made transition -
          New Request Pending for Approval
          6s 1
          Vijayendra Shinde (Inactive) made transition -
          Pending for Approval Approved for Development
          1s 1
          Niteen Surwase (Inactive) made transition -
          Approved for Development In Development
          3d 3h 43m 1
          Niteen Surwase (Inactive) made transition -
          In Development In LB Testing
          6s 1
          Zeeshan Chishty (Inactive) made transition -
          In LB Testing Pending for Stage Approval
          4d 9m 1
          Niteen Surwase (Inactive) made transition -
          Pending for Stage Approval Approved for Stage
          47d 18h 6m 1
          Vijayendra Shinde (Inactive) made transition -
          Approved for Stage Stage Testing
          4h 56m 1
          Vijayendra Shinde (Inactive) made transition -
          Stage Testing Pending for Production Approval
          24s 1
          Niteen Surwase (Inactive) made transition -
          Pending for Production Approval Approved for production
          5d 41m 1
          Deepali Tidke (Inactive) made transition -
          Approved for production In Production Testing
          8d 21h 42m 1
          Deepali Tidke (Inactive) made transition -
          In Production Testing Production Complete
          3s 1
          Deepali Tidke (Inactive) made transition -
          Production Complete Closed
          1s 1

            People

            Assignee:
            deepalit Deepali Tidke (Inactive)
            Reporter:
            vijayendra Vijayendra Shinde (Inactive)
            Developer:
            Niteen Surwase (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

              Dates

              Created:
              Updated:
              Resolved: