- Server operating system version
- Ubuntu 22.04
- Plesk version and microupdate number
- 18.0.66 Update #2
Hello everyone,
A well known vulnerability scanner reported that our Plesk server (Ubuntu 22, Obsidian 18.0.66 Update #2) is vulnerable for TLS BREACH attacks (cve-2013-3587).
The vulnerability scanner checks if the remote web server has HTTP compression enabled and if it does report the vulnerability. But even with HTTP compression enabled the web application hosted on the web server might not be vulnerable.
Should I disable HTTP compression on all our Plesk servers? Or has Plesk mitigated this thread in another way?
Looking forward to your feedback!
Regards,
Mark
A well known vulnerability scanner reported that our Plesk server (Ubuntu 22, Obsidian 18.0.66 Update #2) is vulnerable for TLS BREACH attacks (cve-2013-3587).
The vulnerability scanner checks if the remote web server has HTTP compression enabled and if it does report the vulnerability. But even with HTTP compression enabled the web application hosted on the web server might not be vulnerable.
Should I disable HTTP compression on all our Plesk servers? Or has Plesk mitigated this thread in another way?
Looking forward to your feedback!
Regards,
Mark