Configuration Management / Strict Transport Security Misconfiguration
Strict Transport Security Misconfiguration is a type of Configuration Management vulnerability that occurs in web and API applications. This vulnerability occurs when a server does not properly enforce the usage of Transport Layer Security (TLS) or Secure Sockets Layer (SSL) protocols, which are used to secure data transmission. This vulnerability is cataloged in the CWE directory under CWE-295: Improper Certificate Validation. The OWASP Testing Guide recommends that organizations test for TLS/SSL configuration to ensure that secure protocols are enforced.
This vulnerability can lead to data leakage, as attackers can redirect requests to insecure channels, or even hijack sessions. Attackers can also perform man-in-the-middle attacks, which can lead to stolen passwords and other confidential information. The risk rating for this vulnerability is rated as high by the CWE directory.
To mitigate this vulnerability, organizations should enforce secure protocols such as TLS/SSL for all web and API applications. This can be done by ensuring that servers are properly configured to only allow secure connections, and by implementing a valid certificate for encryption and authentication.