-
Notifications
You must be signed in to change notification settings - Fork 0
HTTP TRACE TRACK Methods Allowed
HTTP TRACE and TRACK methods are used primarily for debugging and diagnostic purposes. However, their presence can be a security risk as they can be exploited for cross-site scripting (XSS) and other attacks. These methods can echo back user inputs, including sensitive information such as cookies and authentication tokens.
- Severity: Medium
- Cross-Site Scripting (XSS): Attackers can exploit the TRACE method to inject malicious scripts, leading to XSS attacks.
- Information Disclosure: Sensitive information like cookies and authentication headers can be disclosed via TRACE or TRACK methods.
- Reconnaissance: Attackers can use these methods to gather information about the server and its configuration.
- Debugging Purposes: TRACE and TRACK methods are enabled for debugging and diagnostics.
- Default Configuration: Some web servers enable these methods by default.
- Misconfiguration: Lack of proper security configurations can leave these methods enabled.
-
Apache:
-
Add the following directive to the Apache configuration file (e.g.,
httpd.conf
or a site-specific config file).TraceEnable off
-
Restart Apache to apply changes.
sudo systemctl restart apache2
-
-
Nginx:
-
Add a custom rule in the server block to deny TRACE and TRACK requests.
if ($request_method ~* ^(TRACE|TRACK)$) { return 405; }
-
Reload Nginx to apply changes.
sudo systemctl reload nginx
-
-
IIS:
-
Use URLScan or Request Filtering to block TRACE and TRACK methods.
<requestFiltering> <verbs> <add verb="TRACE" allowed="false" /> <add verb="TRACK" allowed="false" /> </verbs> </requestFiltering>
-
Restart IIS to apply changes.
iisreset
-
-
Edit Apache Configuration:
sudo nano /etc/apache2/conf-available/security.conf # Add the following line: TraceEnable off
-
Restart Apache:
sudo systemctl restart apache2
-
Edit Nginx Configuration:
sudo nano /etc/nginx/nginx.conf # Add the following lines in the server block: if ($request_method ~* ^(TRACE|TRACK)$) { return 405; }
-
Reload Nginx:
sudo systemctl reload nginx
- Home - Return to this main page.
- Explore detailed vulnerability categories and entries via the sidebar.
- Microsoft Teams < 1.6.0.11166 Information Disclosure↗
- Microsoft Teams < 1.6.0.18681 RCE↗
- Microsoft Windows Unquoted Service Path Enumeration↗
- Microsoft XML Parser (MSXML) and XML Core Services Unsupported↗
- Security Updates for Microsoft .NET Framework↗
- Security Updates for Microsoft Office Products C2R↗
- Security Updates for Microsoft SQL Server↗
- Windows Defender Antimalware/Antivirus Signature Definition Check↗
- Windows Speculative Execution Configuration Check↗
- WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation↗
- SSL Certificate Cannot Be Trusted↗
- SSL Certificate Chain Contains RSA Keys Less Than 2048 bits↗
- SSL Certificate with Wrong Hostname↗
- SSL Medium Strength Cipher Suites Supported (SWEET32)↗
- SSL Self-Signed Certificate↗
- SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)↗
- TLS Version 1.0 Protocol Detection↗
- TLS Version 1.1 Protocol Deprecated↗
- Apache 2.4.x < 2.4.58 Multiple Vulnerabilities↗
- Apache Log4j Vulnerabilities↗
- Apache Solr Unauthenticated Access Information Disclosure↗
- Apache Struts Vulnerabilities↗
- Apache Tomcat Vulnerabilities↗
- Amazon Corretto Java 11.x < 11.0.19.7.1 Multiple Vulnerabilities↗
- OpenJDK Vulnerabilities↗
- Oracle Java SE Vulnerabilities↗
- 7-Zip < 23.00 Multiple Vulnerabilities↗
- Adobe Acrobat Vulnerabilities↗
- AMQP Cleartext Authentication↗
- Artifex Ghostscript < 10.2.1 DoS↗
- Chargen UDP Service Remote DoS↗
- Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039)↗
- Echo Service Detection↗
- HSTS Missing From HTTPS Server (RFC 6797)↗
- HTTP TRACE / TRACK Methods Allowed↗
- Insecure Windows Service Permissions↗
- Keepass < 2.54 Information disclosure↗
- Notepad++ < 8.5.7 Multiple Buffer Overflow Vulnerabilities↗
- Quote of the Day (QOTD) Service Detection↗
- VMware Tools 10.3.x / 11.x / 12.x < 12.3.5 Token Bypass↗
- X Server Detection↗
- Template -> Use this template for new vulnerabilities