1. What is the issue? Please be detailed.
I have successfully installed ODK Central on the local infrastructure. We plan to use this local environment to collect data for a research study that will soon be starting.
I work with one the big organizations and they have their own information security department that usually carries out security vulnerabilities of all systems before being published online. The information security department has conducted security vulnerabilities and identified the following issues that need to be addressed before proceeding with publishing the server.
- 1.1 No Rate Limiting (Login) - Rate limiting enables a brute-force attack, this is to guess user credentials by systematically trying every possible
combination. The server does not limit multiple requests by the client, thus the application becomes vulnerable to
rate limiting attack.
It was observed that the login page does not enforce rate limiting, allowing an attacker to repeatedly attempt login
credentials without restriction, facilitating brute-force attacks. - Missing HTTP Security Headers - HTTP security headers are a subset of HTTP headers and are exchanged between a web client (usually a browser)
and a server to specify the security-related details of HTTP communication.
It was observed that common security headers are missing in the application - Obsolete Components (jQuery & Bootstrap) - Obsolete components, which are no longer supported, may pose security risks due to identified vulnerabilities. As
systems grow and change over time, it is often necessary to update or replace components to keep them secure.
It is identified that the application is using obsolete components (jQuery v3.6.0 & Bootstrap v3.4.1).
2. What steps can we take to reproduce this issue?
Conduct security vulnerabilities check on the central server,
3. What have you tried to fix the issue?
I have installed f2ban to block ips that unsuccessfully try to login to the central server after 5 successful tries. But this seems to be not working.
Do we have any solutions to the issues the information security department flagged? I would appreciate any help from the team here.