Security Report Summary
A
Site: https://uat.consumerstracking.com/consumeree/ee/jsp/login.jsp
IP Address: 216.128.250.38
Report Time: 26 Feb 2017 21:15:26 UTC
Report Short URL: https://schd.io/K0l
Headers:
  • Content-Security-Policy
  • Referrer-Policy
  • X-Content-Type-Options
  • X-XSS-Protection
  • X-Frame-Options
  • Strict-Transport-Security
  • Public-Key-Pins
Warning: Grade capped at A, please see warnings below.
Raw Headers
HTTP/1.1404 Not Found
DateSun, 26 Feb 2017 21:15:25 GMT
ServerApache
Content-Length1164
X-Powered-ByServlet/3.0 JSP/2.2
Content-Security-Policydefault-src 'none'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; connect-src 'self'; img-src 'self' data:; style-src 'self' 'unsafe-inline'; form-action 'self';
Referrer-Policyno-referrer
X-Content-Security-Policydefault-src 'self'
X-WebKit-CSPdefault-src 'self'
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsDENY
Strict-Transport-Securitymax-age=631138519; includeSubDomains
Public-Key-Pinspin-sha256="SaXqRyWo2h+1BWes2RXr52KcaxOijMqT4c4oNC6g2dQ="; pin-sha256="2ZMW+4zYSuPMoLVSO+ofa8k0O2pJIuMyGYnxapDrIxU="; max-age=2592000; includeSubDomains
Content-Typetext/html; charset=UTF-8
Other Services
Applause Great, you scored an A! Just a small step away from a perfect score. Curious how you would hold up against a real attack? Visit our friends at Applause for a health check.
Warnings
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the script-src directive. This policy contains 'unsafe-eval' which is dangerous in the script-src directive.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
X-Powered-ByX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header should be removed or the value changed.
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
X-Content-Security-PolicyX Content Security Policy is required for CSP support in IE 10 and IE 11. For other modern browsers the Content-Security-Policy header should be used.
X-WebKit-CSPX-Webkit-CSP is required for CSP support in older Chrome, Safari and other Webkit based browsers. For other modern browsers the Content-Security-Policy header should be used.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block".
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
Public-Key-PinsHTTP Public Key Pinning protects your site from MiTM attacks using rogue X.509 certificates. By whitelisting only the identities that the browser should trust, your users are protected in the event a certificate authority is compromised. Analyse this policy in more detail.