提问人:varun bhujbal 提问时间:10/30/2023 最后编辑:James Zvarun bhujbal 更新时间:10/31/2023 访问量:24
在 VA-PT 的 Ionic 应用程序中遇到此“常规服务器漏洞”和“HTTP TRACE 方法已启用”安全问题
Getting this 'General Server Vulnerabilities' and 'HTTP TRACE method is enabled' security concern in Ionic application in VA-PT
问:
我们的团队在 Ionic 应用程序中遇到了严重的安全问题。这些问题的根源在于我们的 Cordova 插件使用特定 API。
1. 一般服务器漏洞:
在我们的 Android 和 iOS 应用程序中,由于“一般服务器漏洞”,我们的 Cordova 插件调用的以下 API 引起了重大警报:
对于Android:
play.googleapis.com:443/c2dm/register3
https://play.googleapis.com:443/c2dm/register3
对于 iOS:
apple-finance.query.yahoo.com:443/v1/yql/applewf/multiquote
iid.googleapis.com:443/iid/register
https://iid.googleapis.com:443/iid/register
尽管我们付出了广泛的努力,但未能找到减轻这些担忧的可行解决方案。
2. HTTP TRACE 方法已启用:
此外,我们的 Cordova 插件利用了以下 API,导致发现启用了 HTTP TRACE 方法,从而带来了重大风险:
对于Android:
https://clientservices.googleapis.com:443/chrome-variations/se osname=android_webview&milestone=88
对于 iOS:
https://api-glb-aaps1b.smoot.apple.com:443/search
https://app-measurement.com:443
https://api.smoot.apple.com:443
我们不确定禁用 HTTP TRACE 方法并有效缓解此漏洞的适当步骤。
正在使用的插件:
我们的 Ionic 应用程序包含以下 Cordova 插件:
"@awesome-cordova-plugins/android-permissions": "^5.45.0",
"@awesome-cordova-plugins/app-version": "^5.45.0",
"@awesome-cordova-plugins/camera": "^5.45.0",
"@awesome-cordova-plugins/chooser": "^5.45.0",
"@awesome-cordova-plugins/clipboard": "^5.45.0",
"@awesome-cordova-plugins/core": "^5.45.0",
"@awesome-cordova-plugins/dialogs": "^5.45.0",
"@awesome-cordova-plugins/fcm": "^6.4.0",
"@awesome-cordova-plugins/file": "^5.45.0",
"@awesome-cordova-plugins/file-opener": "^5.45.0",
"@awesome-cordova-plugins/file-path": "^5.45.0",
"@awesome-cordova-plugins/file-transfer": "^5.45.0",
"@awesome-cordova-plugins/image-picker": "^6.4.0",
"@awesome-cordova-plugins/keyboard": "^5.45.0",
"@awesome-cordova-plugins/local-notifications": "^5.45.0",
"@awesome-cordova-plugins/network": "^5.44.0",
"@awesome-cordova-plugins/streaming-media": "^5.45.0",
"@awesome-cordova-plugins/toast": "^5.45.0",
"@ionic-native/browser-tab": "^5.36.0",
"@ionic-native/core": "^5.36.0",
"@ionic-native/crop": "^5.36.0",
"@ionic-native/file": "^5.36.0",
"@ionic-native/file-picker": "^5.36.0",
"@ionic-native/http": "^5.36.0",
"@ionic-native/image-picker": "^5.36.0",
"@ionic-native/in-app-browser": "^5.36.0",
"@ionic-native/keyboard": "^5.36.0",
"@ionic/angular": "^6.2.4",
"@ionic/angular-server": "^6.2.5",
"@ionic/cordova-builders": "^7.0.0",
"@ionic/storage": "^2.1.3",
"@ngrx/effects": "^14.3.0",
"@ngrx/store": "^14.3.0",
"ajv-keywords": "^5.1.0",
"autolinker": "^4.0.0",
"chart.js": "^4.3.0",
"cordova-browser": "6.0.0",
"cordova-plugin-androidx-adapter": "^1.1.3",
"cordova-plugin-iroot": "^3.1.0",
"cordova-plugin-telerik-imagepicker": "^2.3.2",
"crypto-js": "^4.1.1",
"dialog": "^0.3.1",
"domsanitizer": "^0.2.3",
"eslint-plugin-ngrx": "^2.1.4",
"ionic-5-gallery-modal": "^0.2.25",
"ionic-native": "^2.9.0",
"ionic-selectable": "^4.9.0",
"ionic4-star-rating": "^1.1.1",
"ios-sim": "^9.0.0",
"moment": "^2.29.4",
"ng-circle-progress": "^1.6.0",
"ng2-charts": "^4.1.1",
"ngx-linky": "^4.0.0",
"rxjs": "~6.6.0",
如何解决这些关键的安全漏洞?
答: 暂无答案
评论