HTTP trace method is enabled on gip.rocks
Medium
Vulnerability Details
Hello,
HTTP TRACE method is enabled on your server which should not be enabled. It can lead to cross site tracing !
Cross site tracing: https://www.owasp.org/index.php/Cross_Site_Tracing
```
curl -X TRACE http://gip.rocks/ -vv
* Hostname was NOT found in DNS cache
* Trying 184.73.218.93...
* Connected to gip.rocks (184.73.218.93) port 80 (#0)
> TRACE / HTTP/1.1
> User-Agent: curl/7.35.0
> Host: gip.rocks
> Accept: */*
>
< HTTP/1.1 200 OK
< Connection: keep-alive
* Server gunicorn/18.0 is not blacklisted
< Server: gunicorn/18.0
< Date: Sat, 04 Feb 2017 10:59:49 GMT
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=UTF-8
< Via: 1.1 vegur
<
```
## Mitigation:
Disable TRACE method support on your server.
Actions
View on HackerOneReport Stats
- Report ID: 203384
- State: Closed
- Substate: resolved
- Upvotes: 5