-
-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: OPTIONSBLEED #703
Comments
Interesting bug. The only idea I can think of to check for this would be to assume that all actual HTTP methods would match The other alternative would be to have a list of possible methods and call out anything not in that list. It would be reasonable with normal HTTP methods and WebDAV methods, but I'm not sure what others exist. Perhaps alerting on "weird" methods is desirable anyway? In any case, this would be more false-positive prone IMO. Thoughts? |
Sounds good. I believe one comma should be added and the pattern seems to require extra care: Maybe I am missing something but the alternative you suggested doesn't sound so difficult: Standard methods: GET, POST, HEAD, PUT, PATCH, DELETE, TRACE, OPTIONS, CONNECT (~from old HTTP.1.1 standard) |
Description
... would be great to get added. Check doesn't seem to be rocket science, to me.
Links/Info
https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html
https://nvd.nist.gov/vuln/detail/CVE-2017-9798
The text was updated successfully, but these errors were encountered: