logo

Database

Http Stack Trace Obtainable

Description

Detects when a web application exposes detailed technical stack traces in error responses. Stack traces can reveal sensitive implementation details, file paths, and system information that attackers could leverage to exploit the application.

Weakness:

234 - Technical information leak - Stacktrace

Category: Information Collection

Detection Strategy

    Makes a POST request to the target URL with an intentionally malformed JWT token in the Authorization header

    Checks if the server responds with a 500-level error status code

    Examines the response content for stack trace information by looking for HTML unordered list elements with id='stacktrace'

    Reports a vulnerability if technical error details are exposed in the response