Subject: | VULNERABILITY REPORT |
Date: | Sat, 25 Aug 2018 22:22:16 +0530 |
To: | bug-WebService-XING [...] rt.cpan.org |
From: | Mayank <mayanksingh100797 [...] gmail.com> |
Hello sir
I have found Information disclosure vulnerability in your subdomain ->
webshop.xing.com <http://hbrc.govt.nz/>
Description of the vulnerability:
The Information about version of server you are using is getting leaked ,
due to improperly handling 403 errors.
Disclosing the web server version should be avoided as an attacker could
look up vulnerabilities that pertain to that certain server version.
As W3C puts it-
Note: Revealing the specific software version of the server might
allow the server machine to become more vulnerable to attacks
against software that is known to contain security holes. Server
implementors are encouraged to make this field a configurable
option.
Steps to reproduce:
1.Go to *http://webshop.xing.com/ <http://webshop.xing.com/>*
2.Add server-status?full=true such that the URL becomes
http://webshop.xing.com/server-status?full=true and click on go.
You can see that the server version is getting disclosed due to improperly
handling 403 error
Impact: (Critical)
As the server version you are using is Apache/2.4.7 (Ubuntu) Server , an
attacker can exploit the existing vulnerabilities pertaining to this
specific version.
Your current version of Apache is vulnerable to many issues like DoS,
Overflow,Sensitive Information Disclosure and Remote Code Execution.
DoS
Reference:
https://www.cvedetails.com/cve/CVE-2014-3523/
<http://goog_1454089082/>
https://www.cvedetails.com/cve/CVE-2014-0231/
<http://goog_1454089082/>
https://www.cvedetails.com/cve/CVE-2014-0118/
<http://goog_1454089082/>
https://www.cvedetails.com/cve/CVE-2014-0117/
<http://goog_1454089082/>
https://www.cvedetails.com/cve/CVE-2014-0098/
<http://goog_1454089082/>
https://www.cvedetails.com/cve/CVE-2013-6438/
Code Exec
Reference:
https://www.cvedetails.com/cve/CVE-2014-0226/
For complete reference:
https://www.cvedetails.com/vulnerability-list/vendor_id-45/product_id-66/version_id-161847/year-2014/
Apache-Http-Server-2.4.7.html
Recommendation:
You should hide server versions because the attacker can use this on
evaluating security vulnerabilities in your infrastructure.Some SQL
Injector that uses error based technique can use the version information to
know the right syntax for the injection attack.Morever,use custom 403/404
error pages. It is important not to disclose the versions.
OWASP reference:
https://www.owasp.org/index.php/Testing_for_Web_Application_Fingerprint
I suggest you to fix this vulnerability as soon as possible.Looking forward
to hear from you.
PFA
Warm Regards
Mayank
Message body is not shown because sender requested not to inline it.