Will the Vulnerability solution below ( Disable Put/Delete/Patch method) result in an impact on Identity Manager and Identity Portal
Often Misused: HTTP Method Override High
URL: https://idm.myco.com:443/iam/im/myenv/ca12/index.jsp
https://idm.myco.com:443/iam/im/myenv/ca12/index.jsp (Often
Misused: HTTP Method Override) High
Issue Details
Kingdom: API Abuse
Solution:
Disable the use of verb tunneling using such headers or query parameters. If a legitimate case exists to enable
this feature, it is important to restrict access of such requests to its intended purpose.
Request
POST /iam/im/myenv/ca12/index.jsp HTTP/1.1
Referer: https://idm.myco.com/iam/im/myenv/ca12/index.jsp
Content-Type: application/x-www-form-urlencoded
Content-Length: 79
Accept: */*
Pragma: no-cache
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/5.0 (Windows NT 6.2; Win64; x64; rv:83.0) Gecko/20100101 Firefox/83.0
Host: idm.myco.com
X-HTTP-METHOD: PUT
X-HTTP-Method-Override: PUT
X-METHOD-OVERRIDE: PUT
Connection: Keep-Alive
X-WIPP: AscVersion=21.2.0.122
X-Scan-Memo:
Category="Audit.Attack";SID="915879BC57BD94D04A7F2CE8D539F27D";PSID="86C9DF3E27CC2A20D3C67C1103767EBC";SessionType="AuditAttack";CrawlType="None";AttackType="HeaderParamManipulation";OriginatingEngineID="98f62a51-96e4-408da4b0-
bfe9208d739f";AttackSequence="0";AttackParamDesc="";AttackParamIndex="0";AttackParamSubIndex="0";CheckId="11534";Engine="HTTP+Verb+Tunneling";SmartMode="4";tht="40";
X-RequestManager-Memo: stid="93";stmi="0";sc="1";rid="a205e3da";
X-Request-Memo: rid="730cdc45";sc="1";thid="58";
Cookie:
CustomCookie=WebInspect173946ZXD7A165A4B43B4544A318561E8243F8B8Y5183;BIGipServeridm.myco.com2156136734.60132.0000;SMIDENTITY=E0kqnfdNrSJCWGDYOZxXZU0lA0t2hIptjnlgFwqOBBUayDDlOoS1ipA6NXjS/
iU/pAg5QJyU3Ug7d6QGMusONk61w97DRL2RZSGZV4F7sBaMiqwzz/Ce/
Ok6WHCyEoapXJZdvWx3bQ1/Rs7jbsFfTfXCuCmTW7EqMbEnHNl/
NqYxXF70RgI8TLJno0gsWI2aYnvtzXo+VD1pMgp0ESIH/Z/
UmvLjtHwoAjYG+M8Xq07ZmRrSyU34XyWy2rDvImqdMfIjAlwl7+x4mQTxwecMI+7zjtyPHLAtmXKH2nNJ1XLqHhOAtAsIDbHLP1KTscW3SYmV9RTkAK6wz/
sd+uDlwDBNOhXBTWW3n7s4w8pxA0Ec0LE0Y4/
o09PzAf8SojQAaJTCSLGnn64kMMmdIK92rYMnZPseS0sV1pmE7V8ZrmtGXnzR7+GsQQvbq9ZL8d11KCKI2FAGKdJM/
Q05Drx0PQc/X3xI9og5tw3IcNKGdAdSY4Lb+HRc4X81cftvAb/J;JSESSIONID=-E1SMEYI-
Release : 14.3
Component : IdentityMinder(Identity Manager)
Identity Portal
RFI
If SCIM REST API along with Connector Xpress 2.0 & Identity portal functionalities are not in use. It won't have impacted on IDM with the vulnerability solution that was applied.