Hello Group;
below are the results of an audit of my newly migrated Exchange 2013 to 2019 as per the guide (Thanks Mariette, Great work) but now I'm leaking my internal IP address information both in email headers and TCP Get requests.
It has me thinking about what is disclosed in the below response header and a need to tighten the disclosed information that results with the default install of IIS when installing Exchange as per the guide, like seeing the IIS version, the network machine name, and the private IP address.
I see there is and extension offered by iis.net to rewrite URL's https://www.iis.net/downloads/microsoft/url-rewrite , But i'm not sure this will solve Exchange header disclosures.
Anyone have thought or have dealt with audit scans and disclosures?
Andrew
>>>>> audit >>>>>
The remote check for the web server internal IP address sends a HTTP GET request to the target web server. The QID is flagged if a "Content-location:" header or a 3xx redirect address in an HTTP response contains an RFC1918 IP address.
PCI DSS 3.2 requirement 1.3.7 "do not disclose private IP addresses and routing information to unauthorized parties".
This is a PCI Fail since confidential information about your network is leaked.
GET / HTTP/1.0
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-cache
Pragma: no-cache
Location: https://192.168.27.7/owa/
Server: Microsoft-IIS/10.0
X-FEServer: JDB-EX19
X-RequestId: 0f784c06-e328-41f1-8a42-0b026793e85d
Date: Wed, 29 Apr 2020 20:11:26 GMT
Connection: close
Content-Length: 0
<<<<