TRACE method is enabled

Description

During the scan, Kayran managed to find that the TRACE method is enabled.
The TRACE method is intended to help developers in debugging.
If the TRACE method is enabled, the web server will “echo” the requests using the TRACE method in its responses with the exact request it received.

An attacker can use this information which will assist him/her in conducting further, more advanced attacks against your assets.

Severity/Score

Average Score – 5.3 Medium

Recommendation

Disable the TRACE method to avoid attackers using it, and through that, better exploiting other vulnerabilities.

References

https://owasp.org/www-community/attacks/Cross_Site_Tracing

https://cwe.mitre.org/data/definitions/16

https://cwe.mitre.org/data/definitions/489.html

< Return to all Vulnerabilities

The Cloud

I’m pretty sure there isn’t a single adult in the world who hasn’t at least heard of The Cloud. Explaining “The Cloud” in 2022 may

Read More »

Servers 101

Let’s have a “quick” Servers 101 Course. Courtesy of Kayran! If you’ve been on the internet for over an hour, you probably already heard of

Read More »

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »