Solved

Slow attach vulnerability

Posted on 2014-02-19
3
1,870 Views
Last Modified: 2014-03-03
I have a site which returned the following vulnerability in one specific page.
How can I prevent it ?

#1 Response
Export...Vulnerable to slow HTTP POST attack
Connection with partial POST body remained open for: 305297 milliseconds
Server resets timeout after accepting request data from peer.
0
Comment
Question by:amucinobluedot
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 15

Accepted Solution

by:
pateljitu earned 500 total points
ID: 39873887
Vulnerable to slow HTTP POST attack a.k.a (DoS), this vulnerability may result into Denial of Service attack. As indicated by error there are certain POST request which are taking 5 minutes to complete, in which case if there are thousand of simultaneous request made it would result in your server to respond very slowly and become unresponsive (D0S).

Please see following article explaining vulnerability and possible fix by changing IIS settings, other solution is to work with WAF which would help detect and prevent DoS attack.

https://community.qualys.com/blogs/securitylabs/2011/07/07/identifying-slow-http-attack-vulnerabilities-on-web-applications

Recommended IIS settings (assuming you have IIS web server):
http://cagdasulucan.blogspot.ca/2013/02/iis-recommendations-against-slow-http.html

https://community.qualys.com/blogs/securitylabs/2011/11/02/how-to-protect-against-slow-http-attacks

Web Application Firewall (WAF):
http://www.applicure.com/Products/dotdefender
0
 

Author Comment

by:amucinobluedot
ID: 39873912
Excellent ! thanks !
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Does your audience prefer people in photos or no people? How can you best highlight what you’re selling? What are your competitors doing, and what can you do that is different and unique from them?  Continue reading to learn how to make your images …
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question