Proxy Disclosure
Description
If the proxy server can be detected or fingerprinted then this information will help a potential attacker to determine a list of targets against the application, potential vulnerabilities on the proxy servers and the presence or absence of any proxy-based components that are able to detect, prevent or mitigate the attack.
Remediation
- Disable the 'TRACE' method on the proxy servers, as well as the origin web/application server.
- Disable the 'OPTIONS' method on the proxy servers, as well as the origin web/application server, if it is not required for other purposes, such as 'CORS' (Cross Origin Resource Sharing).
- Configure all proxies, application servers, and web servers to prevent disclosure of the technology and version information.
REST Specific
Asp_net
Ruby_on_rails
Next_js
Laravel
Express_js
Django
Symfony
Spring_boot
Flask
Nuxt
Fastapi
Configuration
Identifier:
configuration/proxy_disclosure
Examples
Ignore this check
checks:
configuration/proxy_disclosure:
skip: true
Score
- Escape Severity: LOW
Compliance
OWASP: API5:2023
pci: 1.3.7
gdpr: Article-32
soc2: CC6
psd2: Article-95
iso27001: A.13.1
nist: SP800-53
fedramp: AC-4
Classification
- CWE: 200
Score
- CVSS_VECTOR: AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
- CVSS_SCORE: 5.8