The response shows the nginx version
J
Judge.me
Submitted None
Actions:
Reported by
cametome006
Vulnerability Details
Technical details and impact analysis
## Summary:
On visiting the https://cache.judge.me/ .It show the nginx version
## Steps To Reproduce:
==send :==
```
GET / HTTP/1.1
Host: cache.judge.me
Cookie: _ga=GA1.2.907415772.1636450777; _gid=GA1.2.1767694824.1636450777; _fbp=fb.1.1636450778172.127612364; _hjid=00598a42-40f4-48cb-84ec-20b9bd4273cd; _hjFirstSeen=1; _fw_crm_v=525f94b4-2c39-4a15-fdd9-de190f62db0e; _hjAbsoluteSessionInProgress=0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Upgrade-Insecure-Requests: 1
Cache-Control: max-age=0
Te: trailers
Connection: close
Content-Length: 0
```
==And the response shows the nginx version==
```HTTP/2 200 OK
Date: Tue, 09 Nov 2021 04:22:44 GMT
Content-Type: application/json; charset=utf-8
Content-Length: 21
Server: nginx/1.20.0
Vary: origin
Access-Control-Allow-Credentials: true
Access-Control-Expose-Headers: WWW-Authenticate,Server-Authorization
Cache-Control: no-cache
Accept-Ranges: bytes
{"message":"Welcome"}```
If you want more information comment below
## Impact
An attacker can use this information for further attacks
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Information Exposure Through Sent Data