The CreatorCon Call for Content is officially open! Get started here.

Penetration Test vulnerability in serviceNow

Hafsa1
Mega Sage

We had penetration test in servicenow for potential vulnerability and found to fix below two.

 

LUCKY13 — Remediation requires disabling the vulnerable ciphers, as noted in the information above.
• Instead of CBE Cipher Suites, use AEAD Cipher Suites such as AES-GCM. 
BREACH — Remediation requires changes to the web server's configuration.
• Turning off HTTP compression
• Separating secrets from user input
• Masking secrets (effectively randomizing by XORing with a random secret per request)
• Protecting vulnerable pages with CSRF
• Length hiding (by adding a random number of bytes to the responses)
• Rate-limiting the requests

 

HOw to fix these

1 REPLY 1

abirakundu23
Giga Sage

Hi @Hafsa1 ,
LUCKY13 & BREACH are  2 importance vulnerability in ServiceNow.
LUCKY13 — Remediation requires disabling the vulnerable ciphers, as noted in the information above.
• Instead of CBE Cipher Suites, use AEAD Cipher Suites such as AES-GCM. 
-> Disable the CBE cipher suites in that case.  You can't  directly do  that. Please raise HI Support case for the same.

BREACH — Remediation requires changes to the web server's configuration.

-> Turning off HTTP compression, you can't do that. Raise HI support case for the same.

Don't expose sensitive information.

Please mark helpful & correct answer if it's worthy for you.