<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP. in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/236939#M39603</link>
    <description>&lt;P&gt;We also had this identified as vulnerability from external pentest:&lt;/P&gt;&lt;P&gt;Extended HTTP Methods Allowed&lt;/P&gt;&lt;P&gt;By issuing an "OPTIONS" Web Request to the remote Web Server (HTTP OPTIONS Method), we have managed to identify the extended HTTP Methods supported.&lt;/P&gt;&lt;P&gt;We have managed to identify that the remote Web Server supports the following HTTP Methods:&lt;/P&gt;&lt;P&gt;Based on the response to an OPTIONS request :&lt;/P&gt;&lt;P&gt;- HTTP methods GET HEAD OPTIONS POST are allowed on :&lt;/P&gt;&lt;P&gt;/sslvpn/Login&lt;/P&gt;&lt;P&gt;Some of the extended HTTP methods that are configured on the remote web server can potentially pose a security risk for the web application(s), as they provide the opportunity to an attacker to modify the files stored on the web server or disclose sensitive information such as the base names and extensions used by the webserver.&lt;/P&gt;&lt;P&gt;Any idea why it's enabled and how we can disable?&lt;/P&gt;</description>
    <pubDate>Fri, 27 Dec 2024 09:32:36 GMT</pubDate>
    <dc:creator>Antonis_Hassiot</dc:creator>
    <dc:date>2024-12-27T09:32:36Z</dc:date>
    <item>
      <title>OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192395#M32230</link>
      <description>&lt;P&gt;Anyone have any idea to close "&lt;U&gt;OPTIONS Method enabled&lt;/U&gt;" VA on checkpoint firewall. Our VAPT team scans the firewall WAN IP and detected this "application supports the OPTIONS HTTP method due to web server misconfiguration."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 11:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192395#M32230</guid>
      <dc:creator>Samsur121</dc:creator>
      <dc:date>2023-09-12T11:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192398#M32232</link>
      <description>&lt;P&gt;Options is regarded safer as it is read only, different to post or put - and web servers today do operate on https only. So why this is a vulnerability, please give sources / references !&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 11:46:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192398#M32232</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-09-12T11:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192402#M32233</link>
      <description>&lt;P&gt;Encourage you to share further details via a support ticket for review.&lt;/P&gt;
&lt;P&gt;See also:&amp;nbsp;&lt;SPAN&gt;sk69160&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 12:32:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192402#M32233</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-09-12T12:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192415#M32238</link>
      <description>&lt;P&gt;See also &lt;A href="https://support.checkpoint.com/results/sk/sk104887" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk104887: &lt;STRONG&gt;HTTP&lt;/STRONG&gt; traffic with non-common &lt;STRONG&gt;HTTP&lt;/STRONG&gt; &lt;STRONG&gt;methods&lt;/STRONG&gt; does not pass through Security Gateway configured as Proxy&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/HTTP-Methods-in-logs/m-p/21412#M3951" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;&lt;STRONG&gt;HTTP&lt;/STRONG&gt; &lt;STRONG&gt;Methods&lt;/STRONG&gt; in logs?&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Management/Query-with-HTTP-S-methods/m-p/79820#M20446" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Query with &lt;STRONG&gt;HTTP&lt;/STRONG&gt;(S) &lt;STRONG&gt;methods&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 13:15:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/192415#M32238</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-09-12T13:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/193916#M32456</link>
      <description>&lt;P&gt;Thank you all for the updates, It was false a positive.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Sep 2023 10:43:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/193916#M32456</guid>
      <dc:creator>Samsur121</dc:creator>
      <dc:date>2023-09-30T10:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: OPTIONS Method enabled vulnerability detected on gateways WAN IP.</title>
      <link>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/236939#M39603</link>
      <description>&lt;P&gt;We also had this identified as vulnerability from external pentest:&lt;/P&gt;&lt;P&gt;Extended HTTP Methods Allowed&lt;/P&gt;&lt;P&gt;By issuing an "OPTIONS" Web Request to the remote Web Server (HTTP OPTIONS Method), we have managed to identify the extended HTTP Methods supported.&lt;/P&gt;&lt;P&gt;We have managed to identify that the remote Web Server supports the following HTTP Methods:&lt;/P&gt;&lt;P&gt;Based on the response to an OPTIONS request :&lt;/P&gt;&lt;P&gt;- HTTP methods GET HEAD OPTIONS POST are allowed on :&lt;/P&gt;&lt;P&gt;/sslvpn/Login&lt;/P&gt;&lt;P&gt;Some of the extended HTTP methods that are configured on the remote web server can potentially pose a security risk for the web application(s), as they provide the opportunity to an attacker to modify the files stored on the web server or disclose sensitive information such as the base names and extensions used by the webserver.&lt;/P&gt;&lt;P&gt;Any idea why it's enabled and how we can disable?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Dec 2024 09:32:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/OPTIONS-Method-enabled-vulnerability-detected-on-gateways-WAN-IP/m-p/236939#M39603</guid>
      <dc:creator>Antonis_Hassiot</dc:creator>
      <dc:date>2024-12-27T09:32:36Z</dc:date>
    </item>
  </channel>
</rss>

