HTTP TRACE / TRACK Methods Allowed

medium Nessus Plugin ID 11213
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

Debugging functions are enabled on the remote web server.

Description

The remote web server supports the TRACE and/or TRACK methods. TRACE and TRACK are HTTP methods that are used to debug web server connections.

Solution

Disable these HTTP methods. Refer to the plugin output for more information.

See Also

https://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf

http://www.apacheweek.com/issues/03-01-24

https://download.oracle.com/sunalerts/1000718.1.html

Plugin Details

Severity: Medium

ID: 11213

File Name: xst_http_trace.nasl

Version: 1.73

Type: remote

Family: Web Servers

Published: 1/23/2003

Updated: 6/12/2020

Dependencies: http_version.nasl

Risk Information

CVSS Score Source: CVE-2004-2320

CVSS Score Rationale: Tenable believes the xst vulnerability only affects confidentiality, not integrity (reflected in nvd's score for cve-2010-0386)

VPR

Risk Factor: Medium

Score: 4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/20/2003

Reference Information

CVE: CVE-2003-1567, CVE-2004-2320, CVE-2010-0386

BID: 9506, 9561, 11604, 33374, 37995

CERT: 288308, 867593

CWE: 16, 200