HSTS Vulnerability in Service Desk Tomcat
search cancel

HSTS Vulnerability in Service Desk Tomcat

book

Article ID: 277090

calendar_today

Updated On:

Products

CA Service Management - Service Desk Manager

Issue/Introduction

This article gives detail steps how Service Desk admins can modify the web.xml file to address the Service Desk Tomcat HSTS(HTTP Strict Transport Security) vulnerability.

Environment

 CA Service Desk Manager 17.3 and up 

 

Resolution


 Service Desk admin can follow these steps 

1. Ensure that SSL is enabled for CA Service Desk Manger.

2. Ensure that the following information should be added in the web.xml file of SDM-install-folder\bopcfg\www\CATALINA_BASE\webapps\CAisd\WEB-INF
Add configuration under the <!-- Add filter here --> statement:

Filter Definition
<filter>
<filter-name>httpHeaderSecurity</filter-name>
<filter-class>org.apache.catalina.filters.HttpHeaderSecurityFilter</filter-class>
<async-supported>true</async-supported>
<init-param>
<param-name>hstsMaxAgeSeconds</param-name>
<param-value>31536000</param-value>
</init-param>
<init-param>
<param-name>antiClickJackingOption</param-name>
<param-value>SAMEORIGIN</param-value>
</init-param>
<init-param>
<param-name>blockContentTypeSniffingEnabled</param-name>
<param-value>false</param-value>
</init-param>
</filter>

Add following configuration under the <!-- Add filter-mapping here --> statement:

Filter Mapping
<filter-mapping>
<filter-name>httpHeaderSecurity</filter-name>
<url-pattern>/*</url-pattern>
<dispatcher>REQUEST</dispatcher>
</filter-mapping>

And save the changes

Note: it is always a good idea to back up the web.xml file before the changes.

3. Restart the Tomcat or CA Service Desk Manager Services.

 

Additional Information

For other Tomcat related Service Desk services, similar approach can be used. For example, one can change the web.xml in SDM-install-folder\bopcfg\www\CATALINA_BASE_VIZ\webapps\CMDBVisualizer\WEB-INF the same way for Visualizer.