NagiosEnterprises / ncpa

Nagios Cross-Platform Agent
Other
177 stars 95 forks source link

NCPA: HSTS Missing from HTTPS Server (RFC 6797) #953

Open cosmicgumbo opened 1 year ago

cosmicgumbo commented 1 year ago

The NCPA agent web page on the client (default port 5693) does not enforce HSTS. Per vulnerability scan from Tenable: The remote HTTPS server does not send the HTTP "Strict-Transport-Security" header. Synopsis: The remote web server is not enforcing HSTS, as defined by RFC 6797. Description: The remote web server is not enforcing HSTS, as defined by RFC 6797. HSTS is an optional response header that can be configured on the server to instruct the browser to only communicate via HTTPS. The lack of HSTS allows downgrade attacks, SSL-stripping man-in-the-middle attacks, and weakens cookie-hijacking protections. Solution: Configure the remote web server to use HSTS. See Also: https://tools.ietf.org/html/rfc6797

ccztux commented 1 year ago

I agree with that and will open a pull request.

deamen commented 1 year ago

The commit is not merged yet. Missing HSTS is a pain...

sawolf commented 1 year ago

I agree that this would be useful.

For when the NCPA devs are able to get around to this: the @ccztux's PR for this is #961.