Vulnerabilities for web-attacks
Some scanners can find vulnerabilities in the Password Manager web-app. Because it is hosted on IIS, you can mitigate some of these vulnerabilities by applying additional IIS configuration.
V1. The response for request did not have an "X-FRAME-OPTIONS" header present
Solution 1:
- Open Internet Information Services (IIS) Manager.
- In the Connections pane on the left side, expand the Sites folder and select the site that you want to protect.
- Double-click the HTTP Response Headers icon in the feature list in the middle.
- In the Actions pane on the right side, click Add.
- In the dialog box that appears, type
X-Frame-Optionsin the Name field and typeSAMEORIGINin the Value field. - Click OK to save your changes.
Refer to http://support.microsoft.com/kb/2694329
V2. Vulnerable to slow HTTP POST Attacks
Solution 2:
- Run the IIS Manager on the machine where Netwrix Password Manager is installed.
- On the left pane navigate to Sites / Default Web Site / PM
- On the middle pane double-click on Request Filtering
- On the right pane click on Edit Feature Settings
- Set the
Maximum allowed content lengthto15000000bytes, set theMaximum URL lengthto1024bytes and set theMaximum query stringto512bytes, then click OK - On the left pane click on Sites, then on the middle pane one-click on Default Web Site and on the right pane click Set Web Site Defaults
- Expand Connection Limits node
- Set the
Connection Time-outto60second or lower, set theMaximum Bandwidthto1400000000bytes, then click OK - Restart the IIS server via Command Prompt (Start "Run",
cmd, typeiisresetand press Enter)
V3. Cookie does not contain the "HTTPOnly" attribute
Solution 3:
You can apply a cookie filter by using URL Rewrite for IIS7: http://www.iis.net/downloads/microsoft/url-rewrite
Install URL Rewrite and paste the following into the <system.webServer> section of your web.config.
<rewrite>
<outboundRules>
<rule name="Add HttpOnly" preCondition="No HttpOnly">
<match serverVariable="RESPONSE_Set_Cookie" pattern=".*" negate="false" />
<action type="Rewrite" value="{R:0}; HttpOnly" />
<conditions>
</conditions>
</rule>
<preConditions>
<preCondition name="No HttpOnly">
<add input="{RESPONSE_Set_Cookie}" pattern="." />
<add input="{RESPONSE_Set_Cookie}" pattern="; HttpOnly" negate="true" />
</preCondition>
</preConditions>
</outboundRules>
</rewrite>
Described here: http://forums.iis.net/post/1963706.aspx
If you have more vulnerabilities to report, please contact Netwrix technical support: https://www.netwrix.com/support.html