Forum Discussion
LTM Management UI Security Settings
I'm running several BIG-IP LTM 5250F appliances on v13.1.0.7. After a recent security audit, the following five items were flagged against the web UI management page. Does anyone know if it is possible to modify and remediate any of these items?
-
Autocomplete HTML Attribute Not Disabled for Password Field (suggested remediation: If the "autocomplete" attribute is missing in the "password" field of the "input" element, add it and set it to "off".)
-
Request vulnerable to Cross-site Request Forgery (suggested remediation: The application should implement anti-CSRF tokens into all requests that perform actions which change the application state or which add/modify/delete content.)
-
Missing "X-Content-Type-Options" header (suggested remediation: Configure your server to send the "X-Content-Type-Options" header with value "nosniff" on all outgoing requests.)
-
Missing "X-XSS-Protection" header (suggested remediation: Configure your server to send the "X-XSS-Protection" header with value "1" (i.e. Enabled) on all outgoing requests.)
-
Information Disclosure in Session Cookie [Username] (suggested remediation: Prevent the application from disclosing data or information within the session cookie.)
- mushair
Altostratus
I am having similar issue after security audit. :
Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "X-Frame-Options: SAMEORIGIN".
X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Feature Policy is a new header that allows a site to control which features and APIs can be used in the browser.
- mushair
Altostratus
I was able to remediate all my issues with the following irules for each:
when HTTP_RESPONSE {
if { !([ HTTP::header exists "content-security-policy " ])} { HTTP::header insert "content-security-policy" "default-src 'self';" } }
when HTTP_RESPONSE {
HTTP::header replace X-Frame-Options "SAMEORIGIN"
}
when HTTP_RESPONSE {
if { !([ HTTP::header exists "X-Content-Type-Options" ])} { HTTP::header insert "X-Content-Type-Options: nosniff" }}
Referrer Policy (this resolved the Feature Policy as well):
when HTTP_REQUEST {
switch -glob [HTTP::header "Referer"] {
"http://www.tssdev.ae.com/*" {
# Allow Request to go through...
}
"" {
HTTP::respond 200 content ""
}
default {
HTTP::redirect [HTTP::header "Referer"]
}
}
}
***for header related tests, check out https://securityheaders.com/" ***
- mushair
Altostratus
https://devcentral.f5.com/s/feed/0D51T00006i7hVhSAI
this helped me with a few
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com