Forum Discussion

2 Replies

  • Hello Puluck,

     

    How did you detect this vulnerability ? If using a known vulnerability scanner such as Qualys or other, could you add the description given by the editor for this vulnerability...

     

    Indeed it will help us to give you the best manner to treat this.

     

    APM has by default security options such as the "Secure" & "HTTP Only" flags for cookie headers.

     

    Once we know why the scanner is raising this vulnerability we can add more security headers to enforce your webtop.

     

    Regards

     

  • This sounds like it's coming from Qualys and it's complaining about certain HTTP headers like X-Frame-Options, X-XSS-Protection, X-Content-Type-Options, CSP etc headers being missing from the HTTP response. You can add them all via an iRule to tighten the security headers and it's covered in great detail here:

    Part 1: https://devcentral.f5.com/articles/tightening-the-security-of-http-traffic-part-1-27511
    Part 2: https://devcentral.f5.com/articles/tightening-the-security-of-http-traffic-part-2-27512
    Part 3: https://devcentral.f5.com/articles/tightening-the-security-of-http-traffic-part-3-27702