Configuration: CSP Protection Appears To Be Missing
mahantsucf opened this issue · 1 comments
Stratos Version
Stratos Version 4.4.0
Frontend Deployment type
- Cloud Foundry Application (cf push)
- [ X] Kubernetes, using a helm chart
- Docker, single container deploying all components
- npm run start
- Other (please specify below)
Backend (Jet Stream) Deployment type
- Cloud Foundry Application (cf push)
- Kubernetes, using a helm chart
- Docker, single container deploying all components
- Other (please specify below)
Expected behavior
When we do an AppScan static scan, the scanning results shouldn’t yield any vulnerabilities.
Actual behavior
We ran Appscan and these vulnerabilities were marked as Low Severity issues.
Steps to reproduce the behavior
AppScan Go: version 0.1.7
Steps
Open Appscan go application
Checkout the code of Stratos : release 4.4.0 (https://github.com/cloudfoundry/stratos.git) in your local machine.
Choose the type of scan i.e. Complete Security Scan
Click on Browse button and browse to the src folder(except test-e2e folder) of the stratos project that you checkout in step 2.
AppScan Go! retrieves appropriate files from the selected folder and lists them for review. No need to change anything on this just click on Continue button.
Click on Create a new scan button ---> Initiate scan : This will initiate the scan process.
When upload to AppScan on Cloud is complete, click the link review the status or results of the scan in the AppScan on Cloud service(there are lots of high severity issue you will see).
Reference : https://help.hcltechsw.com/appscan/ASoC/src_irx_gen_gui.html
Log output covering before error and any error statements
Log output covering before error and any error statements
![AppScan_Log](https://user-images.githubusercontent.com/81233158/127614123-2628af8c-ce96-4fe0-ac54-2dd8b4ef7e32.PNG)
Detailed Description
Exact Location where the issue occurs:
src\frontend\packages\cf-autoscaler\src\store\app-autoscaler.actions.ts:108
src\frontend\packages\cf-autoscaler\src\store\app-autoscaler.actions.ts:116
src\frontend\packages\cf-autoscaler\src\store\app-autoscaler.actions.ts:244
src\frontend\packages\cloud-foundry\src\actions\application.actions.ts:158
src\frontend\packages\cloud-foundry\src\actions\application.actions.ts:117
Context
A potential security configuration error has been identified. Security configuration errors in the web server, application server, application
framework, operating system, or database can threaten the security of the application and its data
Possible Implementation
Review the identified setting and make sure that all appropriate hardening has been performed. In particular:
- Verify that default passwords have been replaced with secure passwords.
- Verify that all unnecessary services and functionality have been disabled.
- Verify that error handling is configured so that no unwanted information is leaked to the user after an error occurs.
It is recommended that a well-documented and repeatable (or automated) process be adopted to ensure that security hardening is
performed consistently and accurately
Is this some kind of a joke? Closing, no detail