Skip to content

HTTP TRACE method enabled

ID: http-trace

Severity: info

Author: nodauf

Tags: miscellaneous,misc,generic

id: http-trace
info:
name: HTTP TRACE method enabled
author: nodauf
severity: info
reference:
- https://www.blackhillsinfosec.com/three-minutes-with-the-http-trace-method/
metadata:
max-request: 2
tags: miscellaneous,misc,generic
http:
- method: TRACE
path:
- "{{BaseURL}}"
matchers:
- type: word
name: trace-request
part: body
words:
- "TRACE / HTTP"
- method: OPTIONS
path:
- "{{BaseURL}}"
matchers:
- type: regex
name: options-request
part: header
regex:
- "(?i)Allow: [A-Z,]*TRACE"
# digest: 4b0a00483046022100f9c42bf24e52d5c2931151045443dab9c60868bbc296777a74f7d21be18a2395022100faff47f82942b010ec7c2296ac7e7b7dec44cc809fb24354686bbaa5729add90:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/miscellaneous/http-trace.yaml"

View on Github