X-Content-Type-Options-Vulnerability/EN: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
Zeile 14: Zeile 14:

Version vom 13. März 2019, 16:10 Uhr

Check of the X-Content-Type header

Check X-Content-Type header is missing.
Beschreibung The X-Content-Type-Options settings in the header prevent that the browser interprets data as anything other than declared by the content type in the HTTP header. The header settings are not set here.
Hintergrund There is only one definable value "nosniff", which prevents the Internet Explorer and Google Chrome from searching for other possible MIME types, other than the declared Content-Type (for example text/html). For Chrome this also applies to downloading extensions. The header entry reduces the load from so-called drive-by download attacks. Websites with support for uploading files which, if the names are chosen skillfully, will be treated as executable files or as dynamic HTML-Datei by the Browser, could infect your computer or other computers with malicious code. For further information on X-Content-Type-Options, please refer to the report by Golem.de (German only).
Auswirkung Implementation is easy and does not require additional adjustments. Prevents attacks on users of Internet Explorer.
Lösung / Tipps nosniff;

Code example of an .htaccess file on an Apache webserver.

<IfModule mod_headers.c>
  # prevent mime based attacks like drive-by download attacks, IE and Chrome
  Header set X-Content-Type-Options "nosniff"

Here is an example of an .htaccess file which will set the Header Scanner to green. (.htaccess example)