Skip to content
Advertisement

Are server 500 errors a security issue?

I’ve found that it’s possible to cause 500 errors on a server using curl and a faked GWT-Permutation with a POST payload. The payload is generating a java.lang.Exception on an Apache server.

Does this open up a security issue? Should I report it to Google’s GWT support?

To clarify the question: Would a significant number of server errors be a concern as a denial of service. I.e. could they exhaust server resources. (Sorry, if this is too hypothetical).

JavaScript

Thanks! Dave

Advertisement

Answer

Obviously a stack trace is information disclosure.

Beyond that, I believe that a user should -never- see a 500 series error because – what is the user supposed to do about it?

Additionally, from a pentesting and remediation perspective – a 500 error could mean that any number of vulnerabilities exist, or none at all. How do we know?

It also makes it difficult to test the risk of a specific vulnerability. Using a recent example such as the now infamous Log4j vulnerabvility – if I send the ${jndi} payload and I get a 500 error – is it because the payload succeeded or is it entirely unrelated?

IMO all teams need to handle all exceptions, no excuses.

User contributions licensed under: CC BY-SA
7 People found this is helpful
Advertisement