<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reported vulnerability for HP System Management Homepage in Server Management - Systems Insight Manager</title>
    <link>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/6417056#M58444</link>
    <description>&lt;P&gt;In the same boat here. Ran the same exact scan with the same vulnerability found.&amp;nbsp;There is nothing on HP's website that even acknowledges this. Is this something we have to live with? Can we get a feature request put in to change this setting?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Mar 2014 20:27:35 GMT</pubDate>
    <dc:creator>Dirte</dc:creator>
    <dc:date>2014-03-18T20:27:35Z</dc:date>
    <item>
      <title>Reported vulnerability for HP System Management Homepage</title>
      <link>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/5821301#M54694</link>
      <description>&lt;P&gt;After running a security audit we were hit with the following vulnerability on several servers and wanted to see if there was a fix for this vulnerability. Thx Don&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Running System Management Homepage version 9.1.0-301&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Nexpos Vulnerbility&lt;/STRONG&gt;: Missing HttpOnly Flag From Cookie&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Desc:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;HttpOnly is an additional flag included in a Set-Cookie HTTP response header. If supported by the browser, using the HttpOnly flag when generating a cookie helps mitigate the risk of client side script accessing the protected cookie. If a browser that supports HttpOnly detects a cookie containing the HttpOnly flag, and client side script code attempts to read the cookie, the browser returns an empty string as the result. This causes the attack to fail by preventing the malicious (usually XSS) code from sending the data to an attacker's website.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Proof:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cookie is not marked as HttpOnly: 'Compaq-HMMD=0001-7b8369c9-f2cf-324f-8386-5528bd04faaf-1347655641042214; path=/; secure; domain=ServerName'&lt;/P&gt;&lt;P&gt;URL: &lt;A href="http://pen:2301/login.jsp" target="_blank"&gt;http://ServerName:2301/login.jsp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cookie is not marked as HttpOnly: 'Compaq-HMMD=0001-352c1600-b869-8b48-801f-861859867f56-1347655641479017; path=/; secure; domain=ServerName'&lt;/P&gt;&lt;P&gt;URL: &lt;A href="https://pen:2381/exchange/default.asp" target="_blank"&gt;https://ServerName:2381/exchange/default.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Nexpos Solution:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Add the HttpOnly to all cookies&lt;/P&gt;&lt;P&gt;For each cookie generated by your web-site, add the "HttpOnly" flag to the cookie. For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Set-Cookie: &amp;lt;name&amp;gt;=&amp;lt;value&amp;gt;[; &amp;lt;Max-Age&amp;gt;=&amp;lt;age&amp;gt;]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [; expires=&amp;lt;date&amp;gt;][; domain=&amp;lt;domain_name&amp;gt;]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [; path=&amp;lt;some_path&amp;gt;][; secure][; HttpOnly]&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2012 18:50:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/5821301#M54694</guid>
      <dc:creator>donbbabb</dc:creator>
      <dc:date>2012-10-01T18:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: Reported vulnerability for HP System Management Homepage</title>
      <link>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/6417056#M58444</link>
      <description>&lt;P&gt;In the same boat here. Ran the same exact scan with the same vulnerability found.&amp;nbsp;There is nothing on HP's website that even acknowledges this. Is this something we have to live with? Can we get a feature request put in to change this setting?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 20:27:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/6417056#M58444</guid>
      <dc:creator>Dirte</dc:creator>
      <dc:date>2014-03-18T20:27:35Z</dc:date>
    </item>
    <item>
      <title>Re: Reported vulnerability for HP System Management Homepage</title>
      <link>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/6419460#M58452</link>
      <description>&lt;P&gt;Finally got to the bottom of this issue. I opened a ticket with the HP's software security response team (SSRT). Here is the reply to the specific vulnerability from Rapid7's Nexpose scan.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;***************************************&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;From:&lt;/STRONG&gt; HP SSRT Security Alert [&lt;A target="_blank" href="mailto:security-alert@hp.com"&gt;mailto:security-alert@hp.com]&lt;/A&gt;&lt;BR /&gt;&lt;STRONG&gt;Sent:&lt;/STRONG&gt; Wednesday, March 19, 2014 2:46 PM&lt;BR /&gt;&lt;STRONG&gt;Subject:&lt;/STRONG&gt; Re: HP System Management Homepage (SMH) Missing HttpOnly Flag from Cookie&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for contacting the HP Software Security Response Team (SSRT).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HP Product Engineering for System Management Homepage (SMH) evaluated the Missing HttpOnly Flag from Cookie issue and has provided the following position statement…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reported vulnerability i.e. Missing HttpOnly Flag from Cookie is a client&lt;/P&gt;&lt;P&gt;side defense mechanism and not a vulnerability, where HTTP-only cookies cannot be&lt;/P&gt;&lt;P&gt;accessed by client side script attack (XSS).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The HTTP-only cookies denotes the cookies that are not visible&lt;/P&gt;&lt;P&gt;through the DOM i.e. not permitting a script to access an HTTP-only cookie.&lt;/P&gt;&lt;P&gt;Thus, mitigating the risk of client side script accessing the protected cookie.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But, HTTP-only cookies do not prevent all XSS exploits and using them is *not a&lt;/P&gt;&lt;P&gt;substitute for eliminating XSS vulnerabilities*.&lt;/P&gt;&lt;P&gt;It is a setting which cannot be relied on as all the browsers do not&lt;/P&gt;&lt;P&gt;support it.&lt;/P&gt;&lt;P&gt;There is no way to control the version of the browser used by the end&lt;/P&gt;&lt;P&gt;user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have implemented sure ways of defending XSS attacks (server side input&lt;/P&gt;&lt;P&gt;validation, input and output encoding) in SMH which are server side settings&lt;/P&gt;&lt;P&gt;and prevent such attacks from taking place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thus the reported vulnerability Missing HttpOnly Flag from Cookie is not a&lt;/P&gt;&lt;P&gt;true vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yours truly,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Software Security Response Team (SSRT)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Hewlett-Packard Company&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**********************************&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So there you have it. Some times it's by design and the scan is just over reactive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just on a other side note while I was searching. If you turn this on, it could break some apps. In the Microsoft OWA world, breaks it. Apache and others alike, results may very.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dirte&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2014 13:43:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/reported-vulnerability-for-hp-system-management-homepage/m-p/6419460#M58452</guid>
      <dc:creator>Dirte</dc:creator>
      <dc:date>2014-03-20T13:43:10Z</dc:date>
    </item>
  </channel>
</rss>

