Have you tried by scanning the site’s origin IP address, not domain, especially if behind CloudFlare (and you'll probably not pass scans unless your behind CloudFlare).
Using Cloudflare has reduced the amount failures... only 1 remains... HttpOnly/Secure
Support said this:
Our code is manipulating cookies both in the JavaScript code (running in the browser) and in the Perl code (running on the server). We made a change in 2022 to set the SameSite attribute to ‘Lax’ to avoid warnings in some browsers.
The problem with the ‘HttpOnly’ attribute is that it means that the cookie would become inaccessible to the JavaScript code, which would break functionality, e.g. the cart, recent products etc. which rely on cookies.
I have not manage to find a solution to this.
I have not tried to raise a false positive on this as it's highly likey will fail - let me know if anyone has done this and succeeded, I will certainly give that a go.
I raised a point that Sellerdeck is not PCI-DSS compliant... response:
Sellerdeck has never professed that the software is PCI-DSS compliant. It does not inherently need to be PCI DSS compliant, it is the responsibility of the software user to be PCI-DSS compliant, if they process payments on their website. This has been acheived in the past by using compliant payment service providers.
Sellerdeck as a business cannot advise you about how to be compliant as we are not PCI-DSS experts. You would need to do your own due diligence to ensure that the requirement is met for your company.
No point in ClearAccept's SellerdeckPay being compliant when the actual Sellerdeck Platform itself isn't.
Comment