Skip to content

Commit

Permalink
Update 14-Test_Other_HTTP_Security_Header_Misconfigurations.md
Browse files Browse the repository at this point in the history
  • Loading branch information
kingthorin authored Feb 24, 2025
1 parent c18a6bf commit be7e4c3
Showing 1 changed file with 12 additions and 13 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -47,19 +47,18 @@ To inspect the security headers used by an application, employ the following met

- **Identify Risky Headers:** Look for headers that could allow excessive access, such as:
- **Evaluate Directives:** Verify whether strict directives are enforced. For example, an overpermissive setup might appear as:
```http
Access-Control-Allow-Origin: *
Access-Control-Allow-Credentials: true
X-Permitted-Cross-Domain-Policies: all
Referrer-Policy: unsafe-url
```

A safe configuration would look like:
```http
Access-Control-Allow-Origin: {theallowedoriginurl}
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
```
```http
Access-Control-Allow-Origin: *
Access-Control-Allow-Credentials: true
X-Permitted-Cross-Domain-Policies: all
Referrer-Policy: unsafe-url
```
A safe configuration would look like:
```http
Access-Control-Allow-Origin: {theallowedoriginurl}
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
```
- **Cross-Reference Documentation:** Use resources such as the [Mozilla Developer Network: Security Headers](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers) to review secure and insecure directives.
### Check for Duplicate, Deprecated / Obsolete Headers
Expand Down

0 comments on commit be7e4c3

Please sign in to comment.