We have report from our security team saying below:
The Web server contains a flaw that may allow a remote attacker to delete arbitrary files by using the HTTP method ‘DELETE’, resulting in a loss of integrity.
====================== Proposed Resolution from the above article:
Microsoft Windows MHTML Cross-Site Scripting
This seems to be related to PIE-20299. The attack location is the only difference. Let me check and get back.
Insecure HTTP Methods Enabled
There is a watt property in Integration server ?watt.server.http.allowOptions? which is set to true by default, change it to false and restart IS the OPTIONS method will not be supported thereafter.
Also, check watt property ?watt.server.cors.supportedMethods=GET,POST,PUT,DELETE,OPTIONS,HEAD? .
Missing Secure Attribute in Encrypted Session (SSL) Cookie Use the below watt property watt.server.http.header.useSecure Specifies whether Integration Server includes the secure attribute in the Set-Cookie header in the response to an HTTP/S client. When the watt.server.http.header.useSecure property is set to true (the default), Integration Server includes the secure attribute in the Set-Cookie header of the HTTPS response to an HTTP/S client. Software AG recommends setting this property to true because it ensures that the cookie is always encrypted while being transmitted from client to server.
Weak SSL Cipher Suites are Supported
It can be controlled by watt.net.ssl.server.strongcipheronly and watt.net.ssl.server.cipherSuiteList
======================================
from the article, I can’t make out anything out of point 1, but I have missed one change which is I have made now:
watt.server.http.allowOptions=false
And asked the security team to run the scan further and this time instead of OLD:
The Web server contains a flaw that may allow a remote attacker to delete arbitrary files by using the HTTP method ‘DELETE’, resulting in a loss of integrity.
New warning is:
TLS/SSL Birthday attacks on 64-bit block ciphers (SWEET32)
TLS/SSL Server Supports 3DES Cipher Suite
Those attacks based on weak ciphers you best block on JVM level in the java.security file.
Let your security team provide you a list what to block. Using latest JVM (and fixes) is definitely also a good idea.
Oracle / Zulu block a lot weak content already by default.
check your extended settings for watt.net.ssl.<client|server>.strongCipherOnly and set these to true.
Set watt.net.client.useJSSE to true and configure your HTTPS-Port to use JSSE (= Yes).
in this case you should additionally check for the allowed protocols settings for JSSE and remove older SSL and TLS versions only leaving TLSv1.2 active, which is hopefully available for all partners you are integrating with.