This incident type refers to a vulnerability in the Apache web server where sensitive information is leaked through the ETag header. The ETag header is used to help browsers cache web pages and can contain metadata about the file being served. However, if the ETag value is not properly configured, it can inadvertently expose information about the server, such as file paths or version numbers. Attackers can use this information to gain insights into a server's configuration and use it to launch further attacks.
Parameters
Debug
Check if Apache server is running
Check Apache server version
List Apache modules and check if mod_headers is enabled
Check Apache server configuration for ETag settings
Check if ETags are being sent in server responses
Check if ETags are being sent in HTTPS responses
Check if ETags are being sent in HTTP/2 responses
Repair
Update the Apache web server to the latest version and apply any patches that address the ETag header vulnerability.
Configure the ETag header to only include a secure hash value that does not reveal any sensitive information about the server or its configuration.
Learn more
Related Runbooks
Check out these related runbooks to help you debug and resolve similar issues.