Runbook

Apache Server Information Leak via ETag Header

Back to Runbooks

Overview

This incident type refers to a vulnerability in the Apache web server where sensitive information is leaked through the ETag header. The ETag header is used to help browsers cache web pages and can contain metadata about the file being served. However, if the ETag value is not properly configured, it can inadvertently expose information about the server, such as file paths or version numbers. Attackers can use this information to gain insights into a server's configuration and use it to launch further attacks.

Parameters

Debug

Check if Apache server is running

Check Apache server version

List Apache modules and check if mod_headers is enabled

Check Apache server configuration for ETag settings

Check if ETags are being sent in server responses

Check if ETags are being sent in HTTPS responses

Check if ETags are being sent in HTTP/2 responses

Repair

Update the Apache web server to the latest version and apply any patches that address the ETag header vulnerability.

Configure the ETag header to only include a secure hash value that does not reveal any sensitive information about the server or its configuration.

Learn more

Related Runbooks

Check out these related runbooks to help you debug and resolve similar issues.