11-13-2020 02:58 PM
Hi community friends,
We recently had a pentesting in my company. I have an ASA 5508 for Anyconnect VPNs, version 9.8 (3) 29. During the audit, the following vulnerability appeared: Security headers not configured. They gave me the following link: https://medium.com/guayoyo/asegurando-las-cabeceras-de-respuestas-http-en-servidores-web-apache-y-nginx-2f71e62ffda4. The problem is that the https responses from the ASA are including the Server & X-Powered-By headers.
I want to know how I can remove those headers for the https responses??? Can I make an update to solve this issue???
11-13-2020 11:05 PM
- As the product can be seen as being an appliance in this context, presumably only by making a support case, or filing an enhancement request.
M.
11-14-2020 04:12 AM
The only two headers I'm aware of that you can remove on the ASA are the x-content and the x-xss. However, it is very interesting to see the ASA returning the Server and the x-powered values as I think it should not. Did you know if that scanner was running on the ASA outside interface or on the inside? did you actually see those values reported by the pentest scanner?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide