This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

OWASP Periodic Table of Vulnerabilities - Fingerprinting

Revision as of 18:59, 20 July 2013 by James Landis (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Return to Periodic Table Working View


Root Cause Summary

One or several components of the underlying software and framework leak version information. This could help an attacker to identify which components are vulnerable. This issue is mitigated by removing all version information.

Browser / Standards Solution


Perimeter Solution

Infrastructure should not leak information which can be used to identify the specific version of platform or infrastructure technology. Perimeter technologies should strip all such version information from outgoing responses.

Generic Framework Solution

  • URL structure should not reveal the underlying technology. Default content should be removed when possible.
  • Make sure that only generic error pages are shown without showing any information of the underlying system.
  • Remove all development and debugging tools.

Custom Framework Solution


Custom Code Solution


Discussion / Controversy



Information Exposure Through Sent Data (CWE-201, MITRE)
File and Directory Information Exposure (CWE-538, MITRE)