N-Stalker掃描後的report - 資安

By Regina
at 2007-11-20T15:53
at 2007-11-20T15:53
Table of Contents
因為之前主機網頁有遭受入侵 當作跳板
所以重新安裝後 使用N-Stalker這套先掃掃看有沒有什麼漏洞
其中有一項是
Comments
An insecure HTTP method has been detected as available in the Web Server side
and may be exploited under certain conditions.
Although it may varies accordingly to the situation, HTTP methods others than
GET, POST and HEAD are not common and should be evaluated before being made
public available on production-level Web Servers.
Some problems may arise because of information leakage problem such as TRACE
method (that may reveal internal private HTTP Headers) or may be used for
client-side credentials stealing attacks. Other methods such as PROPFIND and
WebDav-based methods may allow for arbitrary file uploading and should not be
available under normal conditions.
This issue can be considered an Insecure Configuration Management as
described in OWASP Top10 Web Application Vulnerabilities, Section A10: "Web
server and application server configurations play a key role in the security
of a web application. These servers are responsible for serving content and
invoking applications that generate content. In addition, many application
servers provide a number of services that web applications can use, including
data storage, directory services, mail, messaging, and more. Failure to
manage the proper configuration of your servers can lead to a wide variety of
security problems."
我本來以為是要限制主機參數傳遞方法
所以加上以下這些
<Directory />
<Limit GET POST OPTIONS>
Order allow,deny
Allow from all
</Limit>
<LimitExcept GET POST OPTIONS>
Order deny,allow
Deny from all
</LimitExcept>
</Directory>
結果還是一樣會有這個commet
請前輩指導 謝謝
--
所以重新安裝後 使用N-Stalker這套先掃掃看有沒有什麼漏洞
其中有一項是
Comments
An insecure HTTP method has been detected as available in the Web Server side
and may be exploited under certain conditions.
Although it may varies accordingly to the situation, HTTP methods others than
GET, POST and HEAD are not common and should be evaluated before being made
public available on production-level Web Servers.
Some problems may arise because of information leakage problem such as TRACE
method (that may reveal internal private HTTP Headers) or may be used for
client-side credentials stealing attacks. Other methods such as PROPFIND and
WebDav-based methods may allow for arbitrary file uploading and should not be
available under normal conditions.
This issue can be considered an Insecure Configuration Management as
described in OWASP Top10 Web Application Vulnerabilities, Section A10: "Web
server and application server configurations play a key role in the security
of a web application. These servers are responsible for serving content and
invoking applications that generate content. In addition, many application
servers provide a number of services that web applications can use, including
data storage, directory services, mail, messaging, and more. Failure to
manage the proper configuration of your servers can lead to a wide variety of
security problems."
我本來以為是要限制主機參數傳遞方法
所以加上以下這些
<Directory />
<Limit GET POST OPTIONS>
Order allow,deny
Allow from all
</Limit>
<LimitExcept GET POST OPTIONS>
Order deny,allow
Deny from all
</LimitExcept>
</Directory>
結果還是一樣會有這個commet
請前輩指導 謝謝
--
Tags:
資安
All Comments
Related Posts
有沒有可以監控dhcp配出去的各ip流量的東西

By Odelette
at 2007-11-20T12:25
at 2007-11-20T12:25
BBS被封鎖 請問該如何突破?

By Robert
at 2007-11-16T07:10
at 2007-11-16T07:10
如何入侵port80

By Hedda
at 2007-11-13T17:24
at 2007-11-13T17:24
如何入侵port80

By Anthony
at 2007-11-13T17:23
at 2007-11-13T17:23
Access Denied (policy_denied)

By Daniel
at 2007-11-12T22:59
at 2007-11-12T22:59