Hello Bruce
Ernst & Young company did the security audit of my website. I have a final report. Therefore, I have a few questions:
1. About Referer (HTTP header field)My web application is susceptible to Reflected Cross - Site Scripting attacks via HTTP header field - Referer.
It is possible to modify GET request and type in the Referer field some script. For example:
GET /HomeSite HTTP/1.1
Host: MyWebSite.com
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:21.0) Gecko/20100101 Firefox/21.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: pl,en-us;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
DNT: 1
Referer: 4a883"> <BODY ONLOAD=alert('test')>
In this case, it will display a message to the user.
Questions:
1. Is it possible to turn of Referer field?
2. Is it possible to validate Referer field?
2. About Secure flag in SessionIDBy using Secure flag the SessionID can be transmitted only by using an encrypted HTTPS.
No Secure flag makes the SessionID can also be sent via unencrypted HTTP protocol, which could potentially allow an attacker to capture the SessionID.
Question:
1. How can I set the Secure flag for SessionID?
3. About HTTP X-FRAME-OPTIONSMy web application is susceptible to Clickjacking (UI Redress) attacks. This means that it is possible to cover one frame to another.
The implementation of the type of clickjacking attack could allow an attacker to persuade the user to perform certain actions in the application.
It should be noted that this concerns mainly the actions that can be performed by clicks on links.
Question:
1. How can I set HTTP X-FRAME-OPTIONS to SAMEORIGIN or DENY?
Improving these points will increase the security of my website.
Additional question:
1. Is it possible to hide version of NetTalk or PHP in HTTP header?
Regards,
Matthew