ZAP Scanning Report

Summary of Alerts

Risk LevelNumber of Alerts
High0
Medium1
Low4
Informational0

Alert Detail

Medium (Medium)X-Frame-Options Header Not Set

Description

X-Frame-Options header is not included in the HTTP response to protect against 'ClickJacking' attacks.

URL

https://annual.wikimedia.org/2016/

URL

https://annual.wikimedia.org/2016/js/build/curtain-ui.js

URL

https://annual.wikimedia.org/2016/css/build/flickity.min.css

URL

https://annual.wikimedia.org/2016/js/build/app.min.js

URL

https://annual.wikimedia.org/2016/css/build/main.css

URL

https://annual.wikimedia.org/2016/js/build/flickity.min.js

URL

https://annual.wikimedia.org/2016/js/build/jQuery.min.2.2.4.js

Instances

7

Solution

Most modern Web browsers support the X-Frame-Options HTTP header. Ensure it's set on all web pages returned by your site (if you expect the page to be framed only by pages on your server (e.g. it's part of a FRAMESET) then you'll want to use SAMEORIGIN, otherwise if you never expect the page to be framed, you should use DENY. ALLOW-FROM allows specific websites to frame the web page in supported web browsers).

Other information

At "High" threshold this scanner will not alert on client or server error responses.

Reference

http://blogs.msdn.com/b/ieinternals/archive/2010/03/30/combating-clickjacking-with-x-frame-options.aspx

CWE Id

16

WASC Id

15

Low (Medium)Incomplete or No Cache-control and Pragma HTTP Header Set

Description

The cache-control and pragma HTTP header have not been set properly or are missing allowing the browser and proxies to cache content.

URL

https://annual.wikimedia.org/2016/

URL

https://annual.wikimedia.org/2016/js/build/curtain-ui.js

URL

https://annual.wikimedia.org/2016/js/build/app.min.js

URL

https://annual.wikimedia.org/2016/js/build/flickity.min.js

URL

https://annual.wikimedia.org/2016/js/build/jQuery.min.2.2.4.js

URL

https://annual.wikimedia.org/2016/fonts/lora-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-bold-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-italic-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-bolditalic-webfont.woff2

URL

https://annual.wikimedia.org/2016/video/editathon-HD.mp4

Instances

11

Solution

Whenever possible ensure the cache-control HTTP header is set with no-cache, no-store, must-revalidate, private; and that the pragma HTTP header is set with no-cache.

Reference

https://www.owasp.org/index.php/Session_Management_Cheat_Sheet#Web_Content_Caching

CWE Id

525

WASC Id

13

Low (Medium)Web Browser XSS Protection Not Enabled

Description

Web Browser XSS Protection is not enabled, or is disabled by the configuration of the 'X-XSS-Protection' HTTP response header on the web server

URL

https://annual.wikimedia.org/2016/

URL

https://annual.wikimedia.org/2016/js/build/curtain-ui.js

URL

https://annual.wikimedia.org/2016/css/build/flickity.min.css

URL

https://annual.wikimedia.org/2016/js/build/app.min.js

URL

https://annual.wikimedia.org/2016/css/build/main.css

URL

https://annual.wikimedia.org/2016/js/build/flickity.min.js

URL

https://annual.wikimedia.org/2016/js/build/jQuery.min.2.2.4.js

Instances

7

Solution

Ensure that the web browser's XSS filter is enabled, by setting the X-XSS-Protection HTTP response header to '1'.

Other information

The X-XSS-Protection HTTP response header allows the web server to enable or disable the web browser's XSS protection mechanism. The following values would attempt to enable it:

X-XSS-Protection: 1; mode=block

X-XSS-Protection: 1; report=http://www.example.com/xss

The following values would disable it:

X-XSS-Protection: 0

The X-XSS-Protection HTTP response header is currently supported on Internet Explorer, Chrome and Safari (WebKit).

Note that this alert is only raised if the response body could potentially contain an XSS payload (with a text-based content type, with a non-zero length).

Reference

https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet

https://blog.veracode.com/2014/03/guidelines-for-setting-security-headers/

CWE Id

933

WASC Id

14

Low (Medium)X-Content-Type-Options Header Missing

Description

The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.

URL

https://annual.wikimedia.org/2016/

URL

https://annual.wikimedia.org/2016/js/build/curtain-ui.js

URL

https://annual.wikimedia.org/2016/css/build/flickity.min.css

URL

https://annual.wikimedia.org/2016/js/build/app.min.js

URL

https://annual.wikimedia.org/2016/css/build/main.css

URL

https://annual.wikimedia.org/2016/js/build/flickity.min.js

URL

https://annual.wikimedia.org/2016/js/build/jQuery.min.2.2.4.js

URL

https://annual.wikimedia.org/2016/fonts/lora-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-bold-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-italic-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-bolditalic-webfont.woff2

URL

https://annual.wikimedia.org/2016/video/editathon-HD.mp4

Instances

13

Solution

Ensure that the application/web server sets the Content-Type header appropriately, and that it sets the X-Content-Type-Options header to 'nosniff' for all web pages.

If possible, ensure that the end user uses a standards-compliant and modern web browser that does not perform MIME-sniffing at all, or that can be directed by the web application/web server to not perform MIME-sniffing.

Other information

This issue still applies to error type pages (401, 403, 500, etc) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.

At "High" threshold this scanner will not alert on client or server error responses.

Reference

http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx

https://www.owasp.org/index.php/List_of_useful_HTTP_headers

CWE Id

16

WASC Id

15

Low (Medium)Content-Type Header Missing

Description

The Content-Type header was either missing or empty.

URL

https://annual.wikimedia.org/2016/fonts/lora-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-bold-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/montserrat-regular-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-italic-webfont.woff2

URL

https://annual.wikimedia.org/2016/fonts/lora-bolditalic-webfont.woff2

Instances

5

Solution

Ensure each page is setting the specific and appropriate content-type value for the content being delivered.

Reference

http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx

CWE Id

345

WASC Id

12