Details | |
---|---|
Alert ID | 40028 |
Alert Type | Active |
Status | release |
Risk | Medium |
CWE | 94 |
WASC | 14 |
Technologies Targeted |
Db / Microsoft SQL Server Language / ASP OS / Windows WS / IIS |
Tags |
OWASP_2017_A06 OWASP_2021_A05 POLICY_QA_FULL WSTG-V42-CONF-05 |
More Info |
Scan Rule Help |
Summary
The Error Logging Modules and Handlers (ELMAH [elmah.axd]) HTTP Module was found to be available. This module can leak a significant amount of valuable information.
Solution
Consider whether or not ELMAH is actually required in production, if it isn't then disable it. If it is then ensure access to it requires authentication and authorization. See also: https://elmah.github.io/a/securing-error-log-pages/Other Info
References
- https://www.troyhunt.com/aspnet-session-hijacking-with-google/
- https://www.nuget.org/packages/elmah
- https://elmah.github.io/