Vulnerabilities / Browser XSS protection disabled
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
↓
The application explicitly disables the browser Cross-Site Scripting (XSS) filter functionality, thus reducing the level of protection browsers provide to users. The XSS filter detects and blocks the execution of malicious code that may be present in a URL, reducing the chances of an attacker being able to explore an XSS vulnerability in the application.
This filter should be seen as an extra layer of defense against XSS and not as a replacement for the recommended XSS prevention techniques.
Update 25th Aug 2023
Turning off the XSS filter is no longer considered a security issue, as this feature is deprecated in all major browsers. In addition, enabling the filter might lead to a false sense of security, as the filter can be bypassed, depending on how it is set. This finding will be set as fixed automatically after the following scan.
How to fix
-
This problem is caused because the application sends the header X-XSS-Protection with value 0, so it can either stop sending the header or change it to 1; mode=block.
By default, browsers have the XSS protection enabled, therefore, not sending the header at all will keep the XSS filter enabled. Sending the header with 1; mode=block will enable the protection, if not already. The header will look like this:
X-XSS-Protection: 1; mode=block
This directive instructs the browser to stop rendering the page if a malicious payload is detected in the URL, instead of sanitizing the URL by removing the malicious parts, which is the default behavior. Blocking rendering is more secure since it prevents side effects caused by sanitization.
Update 25th Aug 2023
Turning off the XSS filter is no longer considered a security issue, as this feature is deprecated in all major browsers. In addition, enabling the filter might lead to a false sense of security, as the filter can be bypassed, depending on how it is set. This finding will be set as fixed automatically after the following scan.
-
This problem is caused because the application sends the header X-XSS-Protection with value 0, so can either stop sending the header or changing it to 1.
By default, browsers have the XSS protection enabled, therefore not sending the header at all will keep the XSS filter enabled. Sending the header with 1 will enable the protection, if not already. For nginx add the following line to your virtual host configuration file:
add_header X-XSS-Protection "1" always;
Additionally there is one optional directive for this header: mode=block.
add_header X-XSS-Protection "1; mode=block" always;
This directive instructs the browser to stop rendering the page if a malicious payload is detected in URL, instead of sanitizing the URL by removing the malicious parts, which is the default behavior. Blocking rendering is safer, since it prevents side effects caused by sanitization.
-
This problem is caused because the application sends the header X-XSS-Protection with value 0, so can either stop sending the header or changing it to 1.
By default, browsers have the XSS protection enabled, therefore not sending the header at all will keep the XSS filter enabled. Sending the header with 1 will enable the protection, if not already. For Apache add the following line to your virtual host configuration file:
Header always set X-XSS-Protection "1"
Additionally there is one optional directive for this header: mode=block.
Header always set X-XSS-Protection "1; mode=block"
This directive instructs the browser to stop rendering the page if a malicious payload is detected in URL, instead of sanitizing the URL by removing the malicious parts, which is the default behavior. Blocking rendering is safer, since it prevents side effects caused by sanitization.