The server is missing the Strict-Transport-Security HTTP header. Alternatively, the headers max-age is too short.
Compromise confidential information sent through insecure channels.
Set the Strict-Transport-Security header with a max-age 63072000 and the includeSubDomains
directive on all server responses.
Unauthorized attacker from adjacent network performing a sniffing attack.
⌚ 30 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The HTTP
Strict-Transport-Security
response header informs the browser
that it should never load a site
using HTTP and should automatically
convert all attempts
to access the site using HTTP
to HTTPS requests instead.
Strict Transport Security
resolves this problem;
as long as you've accessed
your bank's web site once using HTTPS,
and the bank's web site uses
Strict Transport Security
,
your browser will know
to automatically use only HTTPS,
preventing hackers from performing
this sort of man-in-the-middle attack.Strict Transport Security
response header to work
your users must have accessed
your website through HTTPS at least once.Strict Transport Security
by increasing the probability
that your users had visited the website
through HTTPS at least once.
Once this condition is met,
the browser will remember
(during
max-age
seconds)
that your site must only be accessed
through HTTPS.max-age
also increases the effectiveness
of the header.Strict-Transport-Security: max-age=31536000
HTTP header in all responses
from your site,
including error pages, HTTP and HTTPS.