Penetration Test vulnerability in serviceNow

Hafsa1
Mega Sage

We had penetration test in servicenow for potential vulnerability and found to fix below two.

 

LUCKY13 — Remediation requires disabling the vulnerable ciphers, as noted in the information above.
• Instead of CBE Cipher Suites, use AEAD Cipher Suites such as AES-GCM. 
BREACH — Remediation requires changes to the web server's configuration.
• Turning off HTTP compression
• Separating secrets from user input
• Masking secrets (effectively randomizing by XORing with a random secret per request)
• Protecting vulnerable pages with CSRF
• Length hiding (by adding a random number of bytes to the responses)
• Rate-limiting the requests

 

HOw to fix these

1 REPLY 1

abirakundu23
Giga Sage

Hi @Hafsa1 ,
LUCKY13 & BREACH are  2 importance vulnerability in ServiceNow.
LUCKY13 — Remediation requires disabling the vulnerable ciphers, as noted in the information above.
• Instead of CBE Cipher Suites, use AEAD Cipher Suites such as AES-GCM. 
-> Disable the CBE cipher suites in that case.  You can't  directly do  that. Please raise HI Support case for the same.

BREACH — Remediation requires changes to the web server's configuration.

-> Turning off HTTP compression, you can't do that. Raise HI support case for the same.

Don't expose sensitive information.

Please mark helpful & correct answer if it's worthy for you.