Finger Print Web Application Framework
Finger Print Web Application Framework
DATE 31/01/2023
RISK Critical
COMPLEXITY Critical
Evidence
● Command:
Summary
After modifying the http methods with ‘OPTIONS’, ‘HEAD’ and ‘TRACE’ the
VULNERABILITY
system object's URL responded with information that could be used by an attacker
SUMMARY
to expand their attack surface.
Web servers that respond to the ‘OPTIONS’, ‘TRACE’ and ‘HEAD’ HTTP methods
expose other methods that are supported by the web server, allowing attackers
to narrow and intensify their efforts.
EXPLOITATION
The request itself may have malicious parameters, but that is seperate from the
Method.
By itself is not really a vulnerability; but if there is no real use for certain
methods it, it just affects a system’s attack surface, and ideally should be disabled
RECOMMENDED unless required.
SOLUTION
Verify that these alternate methods do not trigger actions without proper
authentication or reveal info about the contents of the web app
It should be noted that the web application uses a security control that lists
CONCLUSION
HTTP verbs.