The A10 Networks ADC, when used to load balance web applications, must replace response codes.
An XCCDF Rule
Description
<VulnDiscussion>Providing too much information in error messages risks compromising the data and security of the application and system. HTTP response codes can be used by an attacker to learn how a web server responds to particular inputs. Certain codes reveal that a security device or the web server defended against a particular attack, which enables the attacker to eliminate that attack as an option. Using ambiguous response codes makes it more difficult for an attacker to determine what defenses are in place. The A10 Networks ADC can be configured to cloak 4xx and 5xx response codes for outbound responses from a web server. The acceptable HTTP response codes are contained in the preconfigured WAF policy file named "allowed_resp_codes".</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-237041r639570_rule
- Severity
- Medium
- References
- Updated
Remediation - Manual Procedure
If the device is used to load balance web servers, configure the device to replace error response codes.
The following command configures a WAF template and includes the option to cloak response codes:
slb template waf
hide-resp-codes