Task #12588

Task #12556: Pentest - 2nd Assessment [2021]

Pentest_CDB - Missing HTTP "Strict-Transport-Security" Header [LOW]

Added by Nurul Athira Abdul Rahim almost 3 years ago. Updated 7 months ago.

Status:Closed - End of life cycleStart date:November 10, 2021
Priority:NormalDue date:
Assignee:Nurul Athira Abdul Rahim% Done:

100%

Category:Penetration Test IssueSpent time:-
Target version:-

Description

The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attacks against its users. This attack is performed by rewriting HTTPS links as HTTP, so that if a targeted user follows a link to the site from an HTTP page, their browser never attempts to use an encrypted connection. The sslstrip tool automates this process.

To exploit this vulnerability, an attacker must be suitably positioned to intercept and modify the victim's network traffic. This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure.

Solution provided by LGMS :

The application should instruct web browsers to only access the application using HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a response header with the name 'Strict-Transport-Security' and the value 'max-age=expireTime', where expireTime is the time in seconds that browsers should remember that the site should only be accessed using HTTPS. Consider adding the 'includeSubDomains' flag if appropriate. Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who has never accessed the application will never have seen the HSTS header, and will therefore still be vulnerable to SSL stripping attacks. To mitigate this risk, you can optionally add the 'preload' flag to the HSTS header, and submit the domain for review by browser vendors.

'Affected URL:

https://10.10.55.34:9444/bsn-cdb-uat/*


Related issues

Related to BSN Corporate Digital Banking - Task #12584: Pentest_CDB - Missing "Content-Security-Policy" Header [LOW] Closed - End of life cycle November 09, 2021

History

#1 Updated by Najmi Pasarudin almost 3 years ago

  • Status changed from New - Begin Life Cycle to Internal Testing
  • Assignee changed from Najmi Pasarudin to Nurul Athira Abdul Rahim
  • % Done changed from 0 to 100

Please refer sc4.png at Task 12584

#2 Updated by Nurul Athira Abdul Rahim almost 3 years ago

  • Status changed from Internal Testing to System Integration Test

#3 Updated by Nurul Athira Abdul Rahim over 2 years ago

  • Status changed from System Integration Test to Development / Work In Progress
  • Assignee changed from Nurul Athira Abdul Rahim to Najmi Pasarudin

Kindly review the fixes, as the new pentest (March,9,20202) result status stated "not solved".

#4 Updated by Najmi Pasarudin over 2 years ago

  • Status changed from Development / Work In Progress to System Integration Test
  • Assignee changed from Najmi Pasarudin to Nurul Athira Abdul Rahim

LGMS team tested in application url instead of web url.
Fixes already applied to staging and production web server.

#5 Updated by Nurul Athira Abdul Rahim 7 months ago

  • Status changed from System Integration Test to Closed - End of life cycle

Closed for this and refer new 2023/2024 pentest report

Also available in: Atom PDF