Vulnerabilities / ASP.NET tracing enabled
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
↓
PCI-DSS -> 6.5.5
ISO27001 -> A.5.33, A.5.34, A.8.4, A.8.9, A.8.12
The ASP.NET tracing feature allows debugging of the web server interactions, by displaying full details of the requests and responses of all users visiting the site. These details are available in a well known URL that is accessible to any user, disclosing any sensitive information that is present there such as session tokens, credentials, private personal information and anything transmitted to and from the application.
An attacker that visits the ASP.NET trace page will easily hijack the accounts of any other user logged in the application just by using the session token it got there.
How to fix
-
ASP.NET tracing is a feature of the ASP.NET framework, configured in the
web.configfile. To disable it, you need to edit theweb.configfile and change thetracedirective within yoursystem.websettings:<configuration> <system.web> <trace enabled="false" localOnly="true"/> </system.web> </configuration>The
localOnly="true"is a fail-safe in case the trace is enabled again. With this flag set totrue, the trace page will only be available through the server itself, i.e. localhost, thus safe from requests from the Internet.