Insecure methods reported for DLP Enforce Server console
book
Article ID: 282275
calendar_today
Updated On:
Products
Data Loss PreventionData Loss Prevention API Detection for Developer Apps Virtual ApplianceData Loss Prevention Core PackageData Loss Prevention EnforceData Loss Prevention Enterprise SuiteData Loss Prevention Plus Suite
Issue/Introduction
Your vulnerability scan reports that the DLP Enforce Server web console has the following options enabled:
Insecure HTTP method - DELETE
Insecure HTTP method - PATCH
Insecure HTTP method - PUT
Insecure HTTP method - TRACE
Environment
All supported versions of the DLP Enforce Server
Resolution
The DLP engineering team has investigated this finding.
With the DLP Enforce UI functionality being offered through REST APIs', different pages support different sets of HTTP methods:
Functionality that can be accessed via REST API will support HEAD, DELETE, POST, GET, OPTIONS, PUT
Functionality that cannot be accessed via REST API will support HEAD, POST, GET, OPTIONS
Dangerous methods continue to be unsupported where their functionality may pose additional risk the Enforce UI.
This guidance is applicable to all supported DLP versions as of today.
Please see attached screenshot for example of HTTP method support