Insecure HTTP Method Allows Unauthorized Actions

XMLWordPrintable

    • Type: Bug
    • Resolution: Unresolved
    • Priority: Medium
    • 3.6.1
    • Affects Version/s: 3.4.0

      An Insecure HTTP Method vulnerability was discovered in https://uatamrit.piramalswasthya.org/aam/#/login . The application or server accepts unsafe HTTP methods such as PUT, DELETE, TRACE, OPTIONS, or CONNECT, which may allow unauthorized users to modify, delete, or probe resources.

      Vulnerability Name Vulnerable Point, Port or Parameter CVE/CWE CVSS Score Overall Risk
      (Severity)
      Mapping with OWASP Testing Checklist Observation / Description Impact Recommendation Reference Steps to reproduce
      Insecure HTTP Method https://uatamrit.piramalswasthya.org/aam/#/login CWE-942 3.7 Low OWASP Configuration and Deploy Management Testing While OPTIONS is a standard method, its enablement without strict controls can expose information that assists attackers in planning further attacks. Misconfigured OPTIONS responses might leak sensitive endpoints or allow Cross-Origin Resource Sharing (CORS) misconfigurations to be exploited. Disclosure of server-supported HTTP methods aiding attackers in reconnaissance.
       
      Increased risk of CORS-related vulnerabilities if preflight requests are allowed without proper validation.
      Restrict OPTIONS method responses to only necessary origins and headers.
       
      Implement proper CORS policies validating origins and methods.
      https://cwe.mitre.org/data/definitions/942.html Step 1: During the security assessment, it was observed that the OPTIONS HTTP method was enabled on the server.

            Assignee:
            Amoghavarsh Desai
            Reporter:
            Shashank Kharkwal
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated: