How to address the vulnerability:”HTTP TRACE Method Enabled”
THREAT TRACE and TRACK are two HTTP methods used to debug web applications. These methods could be used by malicious users to perform Cross-site Tracing attacks which are used to bypass authentication token protections. httpd server is vulnerable to TRACE requests and this needs to be remedied, We need to disallow http trace requests in… Read More »