Skip to content

Latest commit

 

History

History
33 lines (26 loc) · 1.71 KB

hsts-header-with-low-duration.md

File metadata and controls

33 lines (26 loc) · 1.71 KB
name severity cvss-score cvss-vector cwe-id cwe-name compliance
HSTS header with low duration
low
4.8
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-319
Cleartext Transmission of Sensitive Information
HIPAA ISO 27001 owasp10 pci PCI v4.0
164.306(a), 164.312(c)(1), 164.312(e)(1)
A.5.14, A.8.9, A.8.24
A2, A5
4.1, 6.5.4
pci4-4.2.1, pci4-6.2.4

The application is setting the Strict-Transport-Security header but with an insecure value, specifically with a low max-age value. A low max-age value means browsers will remember that the site is only to be accessed using HTTPS for a short time. Every time the max-age expires, the browser will allow HTTP requests to be made to the site, thus putting whatever information is being transmitted at risk of being intercepted by an attacker. The lower the value, the more likely for HTTP requests to be allowed and more chances of putting the information at risk.

How to fix

{% tabs hsts-header-with-low-duration %} {% tab hsts-header-with-low-duration generic %} The application should set the Strict-Transport-Security header with secure values. You just need to increase the max-age value to a higher value.

A secure header will look like this:

Strict-Transport-Security: max-age=15768000;includeSubdomains 

The max-age value is set to 6 months to increase the chances of the browser remembering that the site is only to be accessed using HTTPS, therefore protecting the user. If the user visits the site again in the 6 months window, which is likely if the user visits the site frequently, it will make the browser remember the setting for another 6 months, thus protecting the user almost constantly. {% endtab %}

{% endtabs %}