?
Solved

Slow attach vulnerability

Posted on 2014-02-19
3
Medium Priority
?
1,930 Views
Last Modified: 2014-03-03
I have a site which returned the following vulnerability in one specific page.
How can I prevent it ?

#1 Response
Export...Vulnerable to slow HTTP POST attack
Connection with partial POST body remained open for: 305297 milliseconds
Server resets timeout after accepting request data from peer.
0
Comment
Question by:amucinobluedot
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 15

Accepted Solution

by:
pateljitu earned 2000 total points
ID: 39873887
Vulnerable to slow HTTP POST attack a.k.a (DoS), this vulnerability may result into Denial of Service attack. As indicated by error there are certain POST request which are taking 5 minutes to complete, in which case if there are thousand of simultaneous request made it would result in your server to respond very slowly and become unresponsive (D0S).

Please see following article explaining vulnerability and possible fix by changing IIS settings, other solution is to work with WAF which would help detect and prevent DoS attack.

https://community.qualys.com/blogs/securitylabs/2011/07/07/identifying-slow-http-attack-vulnerabilities-on-web-applications

Recommended IIS settings (assuming you have IIS web server):
http://cagdasulucan.blogspot.ca/2013/02/iis-recommendations-against-slow-http.html

https://community.qualys.com/blogs/securitylabs/2011/11/02/how-to-protect-against-slow-http-attacks

Web Application Firewall (WAF):
http://www.applicure.com/Products/dotdefender
0
 

Author Comment

by:amucinobluedot
ID: 39873912
Excellent ! thanks !
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When crafting your “Why Us” page, there are a plethora of pitfalls to avoid. Follow these five tips, and you’ll be well on your way to creating an effective page.
This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
The viewer will learn how to dynamically set the form action using jQuery.
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.

801 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question