Quantcast
Channel: Exchange Server 2013 - General Discussion forum
Viewing all articles
Browse latest Browse all 4521

Exchange 2013 Pen Test Web Server Internal IP Address/Internal Network Name Disclosure Vulnerability

$
0
0

Hello

We have to exchange 2013 CU13 servers that have a failed our recent pen test due to Web Server Internal IP Address/Internal Network Name Disclosure Vulnerability PCI DSS 3.2 requirement 1.3.7 "do not disclose private IP addresses and routing information to unauthorized parties".

Can anyone offer a solution to this?

THREAT:
Some Web servers contain a vulnerability giving remote attackers the ability to attain your internal IP address or internal network name.
An attacker connected to a host on your network using HTTPS (typically on port 443) could craft a specially formed GET request from the Web
server resulting in a 3XX Object Moved error message containing the internal IP address or internal network name of the Web server.
A target host using HTTP may also be vulnerable to this issue.
QID Detection Logic:
The remote check for the web server internal IP address sends a HTTP GET request to the target web server. The QID is flagged if a "Contentlocation:"
header or a 3xx redirect address in an HTTP response contains an RFC1918 IP address.
Payment Card Industry (PCI) Technical Report page 76
PCI DSS 3.2 requirement 1.3.7 "do not disclose private IP addresses and routing information to unauthorized parties". This is an "automatic failure"
per ASV Program Guide 6.3.3, #4 (page 32).

IMPACT:
Successful exploitation of this vulnerability results in the disclosure of your internal IP address or internal network name, which could then be used in
further attacks against the target host.

SOLUTION:
There are no patches available at this time. Please contact your vendor for updates.


Viewing all articles
Browse latest Browse all 4521

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>