HTTP.TRACE.TRACK.XST

description-logoDescription

This indicates an attempt to exploit a XST (Cross Site Trace) attack through HTTP Command TRACE or TRACK.
The vulnerability is a result of the application sending back sensitive information with HTTP TRACE request or HTTP TRACK request. As a result, a remote attacker can send a crafted query to gain sensitive information from a vulnerable server.

affected-products-logoAffected Products

Server with TRACE or TRACK HTTP Command enabled

Impact logoImpact

Information Disclosure: Remote attackers can gain sensitive information from vulnerable systems.

recomended-action-logoRecommended Actions

Disable TRACK or TRACE command if not needed.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)