Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server leaks version information via Server HTTP response header #2716

Open
dsotirho-ucsc opened this issue Feb 4, 2025 · 0 comments
Open
Assignees
Labels
-- [priority] Low bug [type] A defect preventing use of the system as specified canary Done by the Clever Canary compliance [subject] Information and software security invicti [subject] Represents one or more Invicti findings orange [process] Done by the Azul team

Comments

@dsotirho-ucsc
Copy link
Contributor

ZAP scan finding
Severity: Low

The web/application server is leaking version information via the "Server" HTTP response Description header. Access to such information may facilitate attackers identifying other vulnerabilities your web/application server is subject to.

Examples:

Solution:

Ensure that your web server, application server, load balancer, etc. is configured to suppress the "Server" header or provide generic details.

@dsotirho-ucsc dsotirho-ucsc added the orange [process] Done by the Azul team label Feb 4, 2025
@github-actions github-actions bot added the canary Done by the Clever Canary label Feb 4, 2025
@achave11-ucsc achave11-ucsc added bug [type] A defect preventing use of the system as specified compliance [subject] Information and software security invicti [subject] Represents one or more Invicti findings -- [priority] Low labels Feb 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
-- [priority] Low bug [type] A defect preventing use of the system as specified canary Done by the Clever Canary compliance [subject] Information and software security invicti [subject] Represents one or more Invicti findings orange [process] Done by the Azul team
Projects
None yet
Development

No branches or pull requests

3 participants