Uploaded image for project: 'OpenNMS'
  1. OpenNMS
  2. NMS-13987

[Web] - WebServer Fingerprinting

    XMLWordPrintable

Details

    Description

      Overview

      If you are running a web server, it often shows the world what type of server it is, its version number, and the operating system. This information is available in header fields and can be acquired using a web browser to make a simple HTTP request to any web application. It is often called the web server banner and is ignored by most people with the exception of malicious ones.

      Attackers can perform banner grabbing using even simple TCP tools like telnet or netcat. Then they launch targeted attacks against your web server and version. In addition, if a particular web server version is known to be vulnerable to a specific exploit, the attacker would just need to use that exploit as part of their assault on the target web server.

      Browser URL

      http://onmspentest.eastus.cloudapp.azure.com/opennms/,http://onmspentest.eastus.cloudapp.azure.com/opennms/login.jsp;jsessionid=node0yljowjflzk1dtqpnef0lea8i1089.node0

      Steps To Reproduce

      • Log in to the application with valid credentials.
      • Capture any request using proxy interception tool like BurpSuite or WebBrowser.
      • Observe that the Server Response Header disclosing the Server: Apache/2.4.37 (centos) OpenSSL/1.1.1k in the server response headers.

      ![Snip20220205_1.png](https://api.cobalt.io/v1/attachments/att_rfgJHw6/preview)

      Suggested Fix

      As a best practice, do not expose the specific software version.

      Cobalt URL

      #PT9265_7

      Attachments

        Activity

          People

            dmitri Dmitri Herdt
            cobalt Cobalt IO
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: