Vulnerabilities/

Apache server-status enabled

Severity:
Medium

Description

Exposing the Apache server-status page allows attackers to gather detailed information about the server’s current state, facilitating potential attacks by revealing active connections, server uptime, and resource usage.

Recommendation

To mitigate this risk, disable the server-status functionality in the Apache configuration file. Additionally, restrict access to the /server-status URL using appropriate access controls.

References

Related Issues

Tags:
Server Misconfiguration
Information Disclosure
Apache
Anything's wrong? Let us know Last updated on May 13, 2024

Use SmartScanner Free version to test for this issue

Download