Fingerprinting Banner Disclosure
Fingerprinting Banner Disclosure
Overview of the Vulnerability
Fingerprinting is where an attacker identifies the services running on a host due to visible default banners. This information helps an attacker to formulate a list of applicable exploits on a target system.
The application responds with a banner disclosing the type and version of the web server being run. From this information an attacker can determine if the application is vulnerable to known vulnerabilities. Older versions of servers are particularly susceptible to known, version-specific attacks if they do not have up-to-date security patches.
Business Impact
Banner disclosures can lead to reputational damage for the business due to a loss in confidence from users who can see that the web server is running on older software. If an attacker is successful in identifying and exploiting a known vulnerability for the identified version of software on this host, this can lead to indirect financial losses and data loss.
Steps to Reproduce
Enable a HTTP interception proxy, such as Burp Suite or OWASP ZAP
Use a browser to navigate to: {{URL}}
Send a request to the endpoint
Using the HTTP interception proxy, observe the response, noting the information disclosed about the server:
{{value}}
Proof of Concept (PoC)
The screenshot below demonstrates the banner disclosure:
{{screenshot}}
Recommendation(s)
It is recommended to keep servers up-to-date with the latest security patches and software versions. If possible, obscure server information in headers to reduce information disclosure.
For more information, please see: https://owasp.org/Top10/A05_2021-Security_Misconfiguration/
Last updated