Plugin ID | 160 |
Plugin name | HTTP TRACE method support detection |
Plugin filename | HTTP TRACE method support detection.plugin |
Plugin filesize | 2976 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/07 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send OPTIONS * HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *Allow:*TRACE* |
Plugin procedure exploit | open|send TRACE /ATK.test HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *TRACE /ATK.test HTTP/1.0* |
Plugin detection accuracy | 97 |
Plugin exploit accuracy | 99 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug affected | Nearly every http web server |
Bug not affected | Specialized and hardened web servers |
Bug vulnerability class | Configuration |
Bug description | In the World Wide Web (WWW) the Hyper Text Transport Protocol (HTTP) is used to transfer the main data. It is client/server based and HTTP requests are used to get the requested data. There is a method named TRACE which is used to invoke a remote, application-layer loop- back of the request message. |
Bug solution | A service if not needed should be de-installed or disabled. If this is not possible, an access control list (ACL) with firewalling should be applied to this port. Do not allow not needed methods as like DELETE, TRACE or TRACK. |
Bug fixing time | Approx. 1 hour |
Bug exploit availability | Yes |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Low |
Bug popularity | 4 |
Bug simplicity | 8 |
Bug impact | 3 |
Bug risk | 5 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.cse.ohio-state.edu/cgi-bin/rfc/rfc2616.html |