The API sets the "X-Powered-By" header in its responses. This header discloses information about the technology of the server hosting the API. An attacker can use this data to identify known vulnerabilities in that specific technology, potentially leading to server compromise. Review the Additional Information section for details about how this violation was detected.
Remove or mask the 'X-Powered-By' header from all API responses to avoid revealing technology details. Configure your server or framework to suppress identifying headers. If you use a reverse proxy, CDN, or load balancer, ensure it does not preserve or re-inject such headers. Keep the server software updated with the latest security patches, and perform regular audits of any libraries or plugins that might introduce additional exposures. Consider deploying a Web Application Firewall (WAF) or intrusion detection system to detect suspicious traffic targeting known weaknesses of the disclosed platform. Periodically verify response headers to confirm that no unnecessary information is leaked.
Code: A05:2021
Category: Security Misconfiguration
3.1
3.1
We use cookies to enhance your browsing experience and analyze our traffic.