Web security HTTP headers

Glide Apps do not currently implement standard web security HTTP headers and additionally they leak information that could help attackers. I would love for this to be remedied to improve the security of apps built with Glide.

For example, see Scan results for engagements.infinityworks.com

MISSING HEADERS

Strict-Transport-Security HTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. Recommended value “Strict-Transport-Security: max-age=31536000; includeSubDomains”.

Content-Security-Policy Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.

X-Frame-Options X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value “X-Frame-Options: SAMEORIGIN”.

X-Content-Type-Options X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is “X-Content-Type-Options: nosniff”.

Referrer-Policy Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.

Permissions-Policy Permissions Policy is a new header that allows a site to control which features and APIs can be used in the browser. HTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. Recommended value “Strict-Transport-Security: max-age=31536000; includeSubDomains”.

Content-Security-Policy Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.

X-Frame-Options X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value “X-Frame-Options: SAMEORIGIN”.

X-Content-Type-Options X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is “X-Content-Type-Options: nosniff”.

Referrer-Policy Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Permissions-Policy Permissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.

X-Xss-Protection - Must be set to 1; mode=block

LAX HEADERS

**access-control-allow-origin *** This is a very lax CORS policy. Such a policy should only be used on a public CDN.

INFORMATION LEAKAGE

x-powered-by and server Trying to minimise the amount of information you give out about your server is a good idea. This header should be removed or the value changed.

We had a configuration issue which resulted in certain url patterns not getting the full set of headers. We have resolved this issue now. Thank you for reporting.

5 Likes