Missing Server Configuration to reduce Server Fingerprinting

Overview

  • Rule ID: javascript_express_reduce_fingerprint

  • Applicable Languages: Javascript

  • Weakness ID: CWE-693

Description

Reducing server fingerprinting enhances security by making it harder for attackers to identify the software your server is running. Server fingerprinting involves analyzing the unique responses of server software to specific requests, which can reveal information about the server's software and version. While this is not a direct security vulnerability, minimizing information leakage is a proactive measure to obscure details that could be used in targeted attacks.

Remediation Guidelines

  • Do disable the X-Powered-By header in Express.js applications to prevent revealing the server's technology stack. Use the app.disable() method to achieve this.

    app.disable('x-powered-by');
    

References

Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our SAST TOOL

Last updated