Skip to main content

This content has been archived and is no longer being updated. Links may not function; however, this content may be relevant to outdated versions of the product.

Support Article

Application level Information leakage prevention



An attacker can collect information about a Web Server, the Version, Frameworks, Development Methodology, or any data related to the infrastructure of an application and use it for Targeted Research, Vulnerability, exploit development against known components, or Social Engineering style attacks against application owners. The information collected increases the likelihood of compromise when publicly disclosed vulnerabilities are released.

The below HTTP response headers disclose information about the application and the version of use on the application URL:
  • X-Generator: Drupal 8
  • X-Varnish: xxx
  • Via: 1.1 varnish (Varnish/5.2)

For example, Server: Apache/2.4.34 (Unix) OpenSSL/1.0.1e-fips mod_jk/1.2.42

Error Messages

Not Applicable

Steps to Reproduce

Check the Raw Request header of the application URL.

Root Cause

Security Vulnerability was observed with Apache Server Version Disclosure.


Perform the following local-change to hide the Apache Server Version: 
  1. Navigate to the $Web_Server/conf folder.
  2. Use the vi Editor to modify httpd.conf.
  3. Add the below directives,

    - ServerTokens Prod
    - ServerSignature Off

  4. Save the httpd.conf.
  5. Restart Apache.
ServerSignature removes the Version information from the Apache generated page.

ServerTokens change the Header to Production only (that is, Apache).

Published March 27, 2020 - Updated October 8, 2020

Was this useful?

0% found this useful

Have a question? Get answers now.

Visit the Collaboration Center to ask questions, engage in discussions, share ideas, and help others.

Did you find this content helpful?

Want to help us improve this content?

We'd prefer it if you saw us at our best.

Pega Community has detected you are using a browser which may prevent you from experiencing the site as intended. To improve your experience, please update your browser.

Close Deprecation Notice
Contact us