We also had this identified as vulnerability from external pentest:
Extended HTTP Methods Allowed
By issuing an "OPTIONS" Web Request to the remote Web Server (HTTP OPTIONS Method), we have managed to identify the extended HTTP Methods supported.
We have managed to identify that the remote Web Server supports the following HTTP Methods:
Based on the response to an OPTIONS request :
- HTTP methods GET HEAD OPTIONS POST are allowed on :
/sslvpn/Login
Some of the extended HTTP methods that are configured on the remote web server can potentially pose a security risk for the web application(s), as they provide the opportunity to an attacker to modify the files stored on the web server or disclose sensitive information such as the base names and extensions used by the webserver.
Any idea why it's enabled and how we can disable?