Apache mod_status /server-status Information Disclosure

Medium Nessus Plugin ID 10677

Synopsis

The remote web server discloses process information.

Description

A remote unauthenticated attacker can obtain an overview of the remote Apache web server's activity and performance by requesting the URL '/server-status'. This overview includes information such as current hosts and requests being processed, the number of workers idle and service requests, and CPU utilization.

Solution

Update Apache's configuration file(s) to either disable mod_status or restrict access to specific hosts.

See Also

https://www.owasp.org/index.php/SCG_WS_Apache

Plugin Details

Severity: Medium

ID: 10677

File Name: apache_server_status.nasl

Version: 1.24

Type: remote

Family: Web Servers

Published: 2001/05/28

Updated: 2018/08/09

Dependencies: 48204

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3.0

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Vulnerability Information

CPE: cpe:/a:apache:http_server

Vulnerability Publication Date: 1999/01/01