Preventing CSRF and Host Header Attacks
FICO® Xpress Insight can be configured to only permit access through the configured URL, disabling access using the direct IP address, an alternative host name, or by using localhost. This prevents a type of attack known as a
Host Header Attack and
Cross Site Origin Request Attack.
To protect
Xpress Insight , complete the following steps:
- Use a text editor to open the file at \xpressmp\insight\server\wildfly-x.y.z.Final\standalone\configuration\standalone.xml.
- Within standalone.xml, find the section that contains the following text: <system-properties>
- Locate the following property which by default will have an empty value:
<property name="com.fico.xpress.insight.ServerUrl" value=""/>
- Edit this property's value to be the URL that users must use to access the service, in this case https://insight.example.com:8443
<property name="com.fico.xpress.insight.ServerUrl" value="https://insight.example.com:8443"/>
- Save your changes to standalone.xml.
- Restart the Xpress Insight service.