Missing Server Configuration to reduce Server Fingerprinting
Last updated
Last updated
Rule ID: javascript_express_reduce_fingerprint
Applicable Languages: Javascript
Weakness ID: CWE-693
Reducing server fingerprinting enhances security by making it harder for attackers to identify the software your server is running. Server fingerprinting involves analyzing the unique responses of server software to specific requests, which can reveal information about the server's software and version. While this is not a direct security vulnerability, minimizing information leakage is a proactive measure to obscure details that could be used in targeted attacks.
Do disable the X-Powered-By
header in Express.js applications to prevent revealing the server's technology stack. Use the app.disable()
method to achieve this.
To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our