HSTS Missing From HTTPS Server Vulnerability on Aria Suite
search cancel

HSTS Missing From HTTPS Server Vulnerability on Aria Suite

book

Article ID: 320603

calendar_today

Updated On: 10-17-2024

Products

VMware Aria Suite

Issue/Introduction

Symptoms:

Vulnerability scanners may detect the web server is not enforcing HSTS in Aria Suite products such as Aria Suite Lifecyle Manager, VMware Identity Manager, Aria Automation, Aria Automation Orchestrator, Aria Operations or Aria Operations for Logs.

 

Cause

Some vulnerability scanners may flag a false positive for "HSTS MISSING FROM HTTPS SERVER" or similar vulnerabilities for the Aria Suite products. 

Resolution

HTTP Strict Transport Security is a feature intended to prevent a man-in-the-middle from forcing a client to downgrade to an insecure connection. The way it is implemented is by a header that is placed in responses from the server, notifying the user's browser that it should only accept an HTTPS connection on subsequent visits to the site. The browser caches this information until it either expires according to the max-age specified in the header, or the user manually removes it.

The vulnerability reported is a generic vulnerability and all Aria Suite products are configured to adhere to HTTP Strict Transport Security which can be verified from the developer options in the browser as shown in the screenshot below.

So this is an false positive report from security scan application, which report only when there is no strict-transport-security header listed.