Unprotected Apache server status pages put popular websites at risk

Potentially sensitive information is exposed that hackers can use to better plan their attacks against websites, researchers say

By Lucian Constantin, IDG News Service |  Security, Apache, Servers

Many Apache Web servers, including those hosting some popular websites, expose information about the internal structure of the sites they host, the IP (Internet Protocol) addresses of their visitors, the resources users access and other potentially sensitive details because their status pages are left unprotected.

The Apache mod_status module generates a "server status" page that contains information about the server's CPU and memory load, as well as details about active user requests, including paths to various internal files and IP addresses.

While this page can be a valuable resource for server administrators, the information it exposes can help hackers better plan their attacks, Daniel Cid, chief technology officer of Web security firm Sucuri, said Tuesday in a blog post.

Sucuri researchers ran a test that involved crawling over 10 million websites and found hundreds of them that expose their server status pages to the whole world. The list of affected websites includes php.net, metacafe.com, disney.go.com, staples.com, nba.com, cisco.com, ford.com, apache.org and many others. Some of them have fixed the problem since Sucuri's report, but many haven't.

"Is that a big deal that I can go to staples.com/server-status/ and see all those orders/connections being made and their IPs?" Cid said. "Or go to one of them and search for 'admin-p' and find a mostly unprotected admin panel (I won't disclose the site). Or find all the internal URLs and vhost mapping for nba.com or ford.com?"

"Probably not a big deal by itself (well, if you don't have an unprotected admin panel), but that can help attackers easily find more information about these environments and use them for more complex attacks," the security researcher said.

At first glance, the solution is simple: add access control directives in the server configuration file in order to restrict access to the /server-status path and only allow access to IP addresses that need to have access to the page.

However, server administrators need to consider the configuration of their whole Web infrastructure, because there are some scenarios in which the Apache access control directives could be inadvertently bypassed.

For example, if a Squid Web caching service is running in reverse proxy mode on the same machine as a Web server that allows /server-status access only from the local IP address, the restriction will be bypassed, Marcus Povey, an independent IT consultant and software developer from U.K., said Thursday via email.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness