Insecure Cross-Domain Policy (allow-http-request-headers-from)

low Web App Scanning Plugin ID 98068

Synopsis

Insecure Cross-Domain Policy (allow-http-request-headers-from)

Description

The browser security model normally prevents web content from one domain from accessing data from another domain. This is commonly known as the "same origin policy".

URL policy files grant cross-domain permissions for reading data. They permit operations that are not permitted by default. The URL policy file for Silverlight is located, by default, in the root directory of the target server, with the name `crossdomain.xml` (for example, at `www.example.com/crossdomain.xml`).

When a domain is specified in `crossdomain.xml`, the site declares that it is willing to allow the operators of any servers in that domain to obtain any document on the server where the policy file resides.

The `crossdomain.xml` file deployed on this website opens the server to all domains (use of a single asterisk "*" as a pure wildcard is supported).

Solution

Carefully evaluate which sites will be allowed to make cross-domain calls.
Consider network topology and any authentication mechanisms that will be affected by the configuration or implementation of the cross-domain policy.

See Also

http://blogs.adobe.com/stateofsecurity/2007/07/crossdomain_policy_files_1.html

https://www.owasp.org/index.php/Test_Cross_Origin_Resource_Sharing_%28OTG-CLIENT-007%29

Plugin Details

Severity: Low

ID: 98068

Type: remote

Published: 3/31/2017

Updated: 11/26/2021

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Low

Base Score: 3.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

Reference Information