[Web] - WebServer Fingerprinting

Description

Overview

If you are running a web server, it often shows the world what type of server it is, its version number, and the operating system. This information is available in header fields and can be acquired using a web browser to make a simple HTTP request to any web application. It is often called the web server banner and is ignored by most people with the exception of malicious ones.

Attackers can perform banner grabbing using even simple TCP tools like telnet or netcat. Then they launch targeted attacks against your web server and version. In addition, if a particular web server version is known to be vulnerable to a specific exploit, the attacker would just need to use that exploit as part of their assault on the target web server.

Browser URL

http://onmspentest.eastus.cloudapp.azure.com/opennms/,http://onmspentest.eastus.cloudapp.azure.com/opennms/login.jsp;jsessionid=node0yljowjflzk1dtqpnef0lea8i1089.node0

Steps To Reproduce

  • Log in to the application with valid credentials.

  • Capture any request using proxy interception tool like BurpSuite or WebBrowser.

  • Observe that the Server Response Header disclosing the Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k in the server response headers.

![Snip20220205_1.png](https://api.cobalt.io/v1/attachments/att_rfgJHw6/preview)

Suggested Fix

As a best practice, do not expose the specific software version.

Cobalt URL

#PT9265_7

Acceptance / Success Criteria

None

Lucidchart Diagrams

Activity

Show:

Jeff Jancula February 14, 2022 at 11:00 PM

Easy fix, limited security value.

 

Changed labels to security-low and quickwin

Done

Details

Assignee

Reporter

HB Backlog Status

Sprint

Priority

PagerDuty

Created February 5, 2022 at 5:50 PM
Updated July 6, 2022 at 5:44 PM
Resolved May 25, 2022 at 1:37 PM