Missing Server Configuration to reduce Server Fingerprinting
Overview
Rule ID:
javascript_express_reduce_fingerprint
Applicable Languages: Javascript
Weakness ID: CWE-693
Description
Reducing server fingerprinting enhances security by making it harder for attackers to identify the software your server is running. Server fingerprinting involves analyzing the unique responses of server software to specific requests, which can reveal information about the server's software and version. While this is not a direct security vulnerability, minimizing information leakage is a proactive measure to obscure details that could be used in targeted attacks.
Remediation Guidelines
Do disable the
X-Powered-By
header in Express.js applications to prevent revealing the server's technology stack. Use theapp.disable()
method to achieve this.
References
Configuration
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL
Last updated