Hello, we're currently failing a PCI scan because of the issues below. I've added "Header always append X-Frame-Options SAMEORIGIN" to my Apache config but it does not appear in the response headers when visiting the site. I have no idea regarding the CSRF but if you feel it's a false positive could you please explain why so I may challenge it.
Click Jacking
Reference ID: http-generic-click-jacking
Reference Type: nexpose
Brief Description: Clickjacking, also known as a UI redress attack, is a method in which an
attacker uses multiple transparent or opaque layers to trick a user into
clicking a button or link on a page other than the one they believe they are
clicking. Thus, the attacker is "hijacking" clicks meant for one page
and routing the user to an illegitimate page.
References:
https://www.owasp.org/index.php/Clickjacking
Evidence:
Running HTTPS service
HTTP response code was an expected 200
HTTP request to
https://reports.primetimesolutions.net/index.php?a=login
HTTP header 'X-Frame-Options' not present
HTTP header 'X-Frame-Options' not present
Status: vulnerable-exploited
Unauthenticated Form Is Vulnerable To CSRF
Reference ID: spider-unauthenticated-form-csrf-vuln
Reference Type: nexpose
Brief Description: Cross-site request forgery vulnerabilities in unathenticated forms can enable
attacks such as login CSRF and distributed DoS attacks.
This is a flaw under the category A5 in the OWASP Top Ten.
References:
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29_Preventio
n_Cheat_Sheet
Evidence:
Vulnerable form myform found at:
https://reports.primetimesolutions.net/login.php
Status: potential