Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SOC2 - Launchpad Penetration Testing Report #104

Open
3 tasks
ravilodhi opened this issue Apr 17, 2024 · 1 comment
Open
3 tasks

SOC2 - Launchpad Penetration Testing Report #104

ravilodhi opened this issue Apr 17, 2024 · 1 comment

Comments

@ravilodhi
Copy link
Contributor

ravilodhi commented Apr 17, 2024

What is the motivation for adding/enhancing this feature?

Here is the Report -

20240221_OWASP_Top_10_2021_https_launchpad_hotwax_io_home.pdf

What are the acceptance criteria?

All the critical vulnerabilities should be fixed.

  • ...

Can you complete this feature request by yourself?

  • YES
  • NO

Additional information

@ravilodhi
Copy link
Contributor Author

ravilodhi commented Apr 17, 2024

A01 Broken Access Control -

  1. Clickjacking: X-Frame-Options header
    UtilHttp.setResponseBrowserDefaultSecurityHeaders(response) method has this header and we started using this in the below OMS PR -
    https://git.hotwax.co/commerce/oms/-/merge_requests/4688/diffs

A04 Insecure Design -

  1. Clickjacking: X-Frame-Options header
    UtilHttp.setResponseBrowserDefaultSecurityHeaders(response) method has this header and we started using this in the below OMS PR -
    https://git.hotwax.co/commerce/oms/-/merge_requests/4688/diffs

  2. Content Security Policy (CSP) not implemented
    OMS PR - https://git.hotwax.co/commerce/oms/-/merge_requests/4688/diffs

A05 Security Misconfiguration -

  1. Content Security Policy (CSP) not implemented
    OMS PR - https://git.hotwax.co/commerce/oms/-/merge_requests/4688/diffs

  2. Permissions-Policy header not implemented
    Severity very low, not fixed.

  3. Reverse proxy detected
    Severity very low, not fixed.

  4. HTTP Strict Transport Security (HSTS) not following best practices (No includeSubDomains directive)
    The method used in the below PR has the needed changes, and now we started using this.
    OMS PR - https://git.hotwax.co/commerce/oms/-/merge_requests/4688/diffs

Note: Nothing is fixed at app side regarding the above vulnerabilities as of now, should be handled by the changes done at OMS side. If needed CSP can be handled at app side using meta tags -

e.g. Adding below meta tag in index.html file.
<meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'self' 'unsafe-eval'; style-src 'self' 'unsafe-inline';"/>

@ravilodhi ravilodhi self-assigned this Apr 29, 2024
@ravilodhi ravilodhi moved this from 📋 Backlog to 📅 Planned in Digital Experience Platform Apr 29, 2024
ravilodhi added a commit that referenced this issue Apr 29, 2024
…ermissions-Policy headers in firebase config in context of soc2 compliance (#104).
@ravilodhi ravilodhi moved this from 📅 Planned to 🛑 On hold in Digital Experience Platform Jul 15, 2024
@ravilodhi ravilodhi moved this from 🛑 On hold to 📋 Backlog in Digital Experience Platform Jul 15, 2024
@ravilodhi ravilodhi removed their assignment Jul 15, 2024
This was referenced Nov 20, 2024
ravilodhi added a commit that referenced this issue Nov 25, 2024
Improved: Added X-Frame-Options, CSP, strict-transport-security and Permissions-Policy headers in firebase config in context of soc2 compliance (#104).
@ravilodhi ravilodhi moved this from 📋 Backlog to 🏗 In progress in Digital Experience Platform Nov 25, 2024
@ravilodhi ravilodhi moved this from 🏗 In progress to ⏸️ Dev complete in Digital Experience Platform Nov 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: ⏸️ Dev complete
Development

No branches or pull requests

1 participant