Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server leaks implementation information #1332

Open
willtemperley opened this issue Jun 12, 2023 · 5 comments
Open

Server leaks implementation information #1332

willtemperley opened this issue Jun 12, 2023 · 5 comments

Comments

@willtemperley
Copy link

Upgrade error responses provide details of the implementation and the protocol. This may be useful when debugging, but in production it's a security risk.

+ "\r\nContent-Type: text/html\r\nServer: TooTallNate Java-WebSocket\r\nContent-Length: "

@marci4
Copy link
Collaborator

marci4 commented Jul 14, 2023

Feel free to open a PR with a option to disable this

@PhilipRoman
Copy link
Collaborator

I don't think there is need to change anything - it is a common practice to report the server implementation and all http servers I know do it. You can pick any site, and do curl -D - -o /dev/null https://example.com | grep -i server and see the server implementation. Apache even reports details like OpenSSL version so I don't see the issue here.

@willtemperley
Copy link
Author

@PhilipRoman The issue is that it isn't necessary to expose the implementation. and if any vulnerabilities exists it makes them easier to exploit. Using your command, I can't find an important website that discloses the server implementation.

"While exposed server information is not necessarily in itself a vulnerability, it is information that can assist attackers in exploiting other vulnerabilities that may exist."

https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/01-Information_Gathering/02-Fingerprint_Web_Server

@marci4
Copy link
Collaborator

marci4 commented Oct 13, 2024

@PhilipRoman I would add an option to the Draft_6455 as well as the server to hide the implementation.
You're cool with it?

@marci4 marci4 added this to the Release 1.6.0 milestone Oct 13, 2024
@PhilipRoman
Copy link
Collaborator

Sure, I don't see any downside

@marci4 marci4 modified the milestones: Release 1.6.0, Release 1.6.1 Dec 8, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants