Idea Summary
APEX renders information about the used software version. The information can be used by attackers to narrow down further possible attack vectors. Examples are version information and detailed error messages. While this does not lead to an immediate security problem, it violates the security best practice of only exposing information that is required on the client side.
Other Software like Apache can hide its version using the “ServerSignature Off” setting.
Use Case
Chrome inspector shows the following information on an APEX page:
var apex = {env: {APP_USER: "name@email.com",APP_ID: "100",APP_PAGE_ID: "201",APP_SESSION: "123456789",APP_FILES: "r\…\…\…\…\…\…",WORKSPACE_FILES: "r\…\…\…\…\…",APEX_VERSION: "24.2.2",APEX_BASE_VERSION: "24.2",COMPATIBILITY_MODE: 21.2,NONCE: "5Xd_RPiQWBn8vhME_8_h5A"},
libVersions:{cropperJs:"1.6.2",domPurify:"3.1.6",fontapex:"2.4",fullcalendar:"6.1.15",hammer:"2.0.8",jquery:"3.6.4",jqueryUi:"1.13.2",maplibre:"4.6.0",mapboxGlRtlText:"0.3.0",markedJs:"14.1.2",prismJs:"1.29.0",oraclejet:"17.0.2",turndown:"7.2.0",monacoEditor:"0.51.0",lessJs:"4.2.0"}};
During the recent security assessment this has been identified as Information Disclosure (LOW) Finding.
Preferred Solution (Optional)
Offer an application setting to hide the information about the software version.