Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Samsur121
Explorer

OPTIONS Method enabled vulnerability detected on gateways WAN IP.

Anyone have any idea to close "OPTIONS Method enabled" VA on checkpoint firewall. Our VAPT team scans the firewall WAN IP and detected this "application supports the OPTIONS HTTP method due to web server misconfiguration."

 

 

0 Kudos
5 Replies
G_W_Albrecht
Legend Legend
Legend

Options is regarded safer as it is read only, different to post or put - and web servers today do operate on https only. So why this is a vulnerability, please give sources / references !

CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Kudos
Chris_Atkinson
Employee Employee
Employee

Encourage you to share further details via a support ticket for review.

See also: sk69160

 

CCSM R77/R80/ELITE
0 Kudos
G_W_Albrecht
Legend Legend
Legend

0 Kudos
Samsur121
Explorer

Thank you all for the updates, It was false a positive.

0 Kudos
Antonis_Hassiot
Contributor

We also had this identified as vulnerability from external pentest:

Extended HTTP Methods Allowed

By issuing an "OPTIONS" Web Request to the remote Web Server (HTTP OPTIONS Method), we have managed to identify the extended HTTP Methods supported.

We have managed to identify that the remote Web Server supports the following HTTP Methods:

Based on the response to an OPTIONS request :

- HTTP methods GET HEAD OPTIONS POST are allowed on :

/sslvpn/Login

Some of the extended HTTP methods that are configured on the remote web server can potentially pose a security risk for the web application(s), as they provide the opportunity to an attacker to modify the files stored on the web server or disclose sensitive information such as the base names and extensions used by the webserver.

Any idea why it's enabled and how we can disable?

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events