Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Low Severity: Unnecessary Http Response Headers found in the Application #4974

Open
2 of 9 tasks
manojtyagi2021 opened this issue Sep 17, 2021 · 0 comments
Open
2 of 9 tasks
Labels
community Community Raised Issue

Comments

@manojtyagi2021
Copy link

Stratos Version

4.4.0

Frontend Deployment type

  • Cloud Foundry Application (cf push)
  • Kubernetes, using a helm chart
  • Docker, single container deploying all components
  • npm run start
  • Other (please specify below)

Backend (Jet Stream) Deployment type

  • Cloud Foundry Application (cf push)
  • Kubernetes, using a helm chart
  • Docker, single container deploying all components
  • Other (please specify below)

Expected behaviour

AppScan DAST scan should not report Unnecessary Http Response Headers found in the Application vulnerability

Actual behaviour

AppScan DAST scan reports Unnecessary Http Response Headers found in the Application vulnerability

Steps to reproduce the behavior

AppScan DAST scans for Stratos URL https://ui.169.53.186.50.nip.io/
The test result seems to indicate a vulnerability because It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations

Log output covering before error and any error statements

image

Detailed Description

The test result seems to indicate a vulnerability because It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations

Risk: It is possible to gather sensitive information about the web application such as usernames, passwords, machine name and/or sensitive file locations
Causes: Insecure web application programming or configuration

Context

Possible Implementation

Do not allow sensitive information to leak.

@richard-cox richard-cox added the community Community Raised Issue label Sep 22, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
community Community Raised Issue
Projects
None yet
Development

No branches or pull requests

2 participants