http TRACE XSS attack
Posted: 2009/05/08 15:09:42
Hi all,
I have tested my centos machine with openvas (security assessment free software).
Openvas reported that my web server supports the TRACE and/or TRACK methods.
This method are subject to cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
The openvas solution is to disabled these method adding the following lines for each virtual host in my configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
I have added this line but the problem persist.....
The secunia website suggest to update the version of httpd from 2.2.52 to 2.2.10 but the centos repository don't have the 2.2.10 version.... but only the 2.2.52.....
Can you help me?
Ps: excuse me for my bad english......
Regards
Paolo
I have tested my centos machine with openvas (security assessment free software).
Openvas reported that my web server supports the TRACE and/or TRACK methods.
This method are subject to cross-site-scripting attacks, dubbed XST for "Cross-Site-Tracing", when
used in conjunction with various weaknesses in browsers.
The openvas solution is to disabled these method adding the following lines for each virtual host in my configuration file :
RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]
I have added this line but the problem persist.....
The secunia website suggest to update the version of httpd from 2.2.52 to 2.2.10 but the centos repository don't have the 2.2.10 version.... but only the 2.2.52.....
Can you help me?
Ps: excuse me for my bad english......
Regards
Paolo