Hello,
I have a question about ServerHeaderInfoLeakScanRule. When I run scan against some solutions based on AWS, those which are served from an S3 will get a low severity alert Server Leaks Version Information via "Server" HTTP Response Header Field with 'AmazonS3' as evidence.
The description is following:
"The web/application server is leaking version information via the "Server" HTTP response header. Access to such information may facilitate attackers identifying other vulnerabilities your web/application server is subject to."
OWASP-ZAP source code\zap-extensions\addOns\pscanrulesBeta\src\main\java\org\zaproxy\zap\extension\pscanrulesBeta\ServerHeaderInfoLeakScanRule.java rule uses a regex, that will raise an alert on any digit in the value: "Pattern.compile(".*\\d.*")"
My question is if it is an intended behavior, as in description problem is that version is leaked, but with value 'AmazonS3' no version is present.
Thanks in advance
Best regards
Stanislava Y