agree on that.. but my company policy states that even for info/low I need 
to seek waiver to close it off..

just need some closure on this. if it is indeed used then i can declare 
that it is required and accept it. 

On Friday, October 30, 2020 at 5:16:20 PM UTC+8 [email protected] wrote:

> Might be 
> https://www.rapid7.com/db/vulnerabilities/http-options-method-enabled
>
> "Web servers that respond to the OPTIONS HTTP method expose what other 
> methods are supported by the web server, allowing attackers to narrow and 
> intensify their efforts."
>
> Which feels like a bit of a stretch, it's only a problem if it enables 
> other attacks and given the the number of HTTP methods it won't slow down 
> any attacker.
> It's a bit like saying "a login form exposes where to input user password 
> for a brute-force attack" ;)
>
> On Friday, 30 October 2020 at 09:01:42 UTC [email protected] wrote:
>
>> it gave a cvss score of 2.6 low and highlight that 
>> http-options-method-enabled. 
>>
>> i could possibly have this waived off, but need to know if it is required 
>> or is there anyway I can disable it if it is not critical to be used. 
>> On Friday, October 30, 2020 at 4:12:41 PM UTC+8 [email protected] wrote:
>>
>>> What exactly does your security scanner say about OPTIONS on prometheus? 
>>> It sounds like a false positive.
>>>
>>

-- 
You received this message because you are subscribed to the Google Groups 
"Prometheus Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/prometheus-users/cb275600-99b1-4316-b873-1f98fe29e53cn%40googlegroups.com.

Reply via email to