On Thursday, July 9, 2020 at 6:42:13 AM UTC-7, [email protected] wrote:
>
> Hi, in this days I'm acting pen-test on my web2py application, all tools 
> used report me that there're some "important"  header are missing..
> In particular:
>
>    - X-Frame-Options Header Not Set (15)
>
>
prevents embedding the page in a frame (or iframe), as a preventative for 
click-jacking.  Geeks-for-geeks says obsoleted by CSP
 

>
>    - [...]
>    - Incomplete or No Cache-control and Pragma HTTP Header Set (26)
>
> prevents caching the page.   I am not sure what the security downside of 
caching the page is, unless there is privileged information like on a 
password reset page.

>
>    - Server Leaks Information via "X-Powered-By" HTTP Response Header 
>    Field(s) (50)
>    
> revealing the type of server can  tell the intruder which attacks might 
work 

>
>    - X-Content-Type-Options Header Missing (48)
>    
> a nosniff setting rejects requests if there is a "style" MIME-type that 
isn't txt/css or a JavaScript type.  (Geeks-for-geeks doesn't explain this 
well, in my opinion.)

The real gurus can comment further.  For more on security practices, you 
might look at OWASP's recommendations.
<URL:https://owasp.org/>

/dps


-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/web2py/93ad06e6-6a5d-4dfe-8246-2f0f27fe0190o%40googlegroups.com.

Reply via email to