Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

HTTP Missing Security Headers

By kannthu

Vidoc logoVidoc Module

HTTP Missing Security Headers

What is the "HTTP Missing Security Headers" module?

The "HTTP Missing Security Headers" module is designed to detect missing security headers in HTTP responses. It targets websites and web applications that may have misconfigured or omitted important security headers. This module is informative in nature and aims to provide insights into potential security vulnerabilities.

Severity: Informative

Original Authors: socketz, geeknik, G4L1T0, convisoappsec, kurohost, dawid-czarnecki, forgedhallpass, jub0bs


The impact of missing security headers can vary depending on the specific header that is missing. Security headers play a crucial role in protecting websites and web applications against various types of attacks, such as cross-site scripting (XSS), clickjacking, and data leakage. Without these headers, the affected website or application may be more vulnerable to these types of attacks.

How does the module work?

The "HTTP Missing Security Headers" module works by sending HTTP requests to the target website or application and analyzing the headers in the response. It checks for the presence of specific security headers and evaluates whether they are missing or misconfigured.

Example of a matching condition:

!regex(`(?i)strict-transport-security`, all_headers) && status_code != 301 && status_code != 302

This condition checks if the "Strict-Transport-Security" header is missing in the response and ensures that the status code is not a redirect (301 or 302).

The module includes additional matching conditions for other security headers, such as "Content-Security-Policy", "X-Frame-Options", "X-Content-Type-Options", and more. Each condition checks for the absence of the corresponding header and verifies that the status code is not a redirect.

By running this module, you can identify potential security weaknesses in the target website or application and take appropriate measures to address them.

Concurrent Requests (0)
Passive global matcher
dsl: !regex(`(?i)strict-transport-security`, ...or
dsl: !regex(`(?i)content-security-policy`, al...or
dsl: !regex(`(?i)permissions-policy`, all_hea...or
dsl: !regex(`(?i)x-frame-options`, all_header...or
dsl: !regex(`(?i)x-content-type-options`, all...or
dsl: !regex(`(?i)x-permitted-cross-domain-pol...or
dsl: !regex(`(?i)referrer-policy`, all_header...or
dsl: !regex(`(?i)clear-site-data`, all_header...or
dsl: !regex(`(?i)cross-origin-embedder-policy...or
dsl: !regex(`(?i)cross-origin-opener-policy`,...or
dsl: !regex(`(?i)cross-origin-resource-policy...
On match action
Report vulnerability