Home / Vulnerability Database / Config files : Information leak
Config files

Config files : Information leak

Overview

System configuration information leak is possible. This can help an attacker to create a plan of an attack.

Debug information and error messages can be written to the log, displayed to the console, or sent to the user depending on the system settings. In some cases, an attacker can make a conclusion about the system vulnerabilities from the error message. For example, a database error can indicate insecurity against SQL injection attacks. Information about the version of the operating system, server applications and system configurations can also be of value to the attacker.

This applies both to the classic web applications and mobile applications.

MEDIUM

DerScanner Severity Score

Do you want to fix Config files : Information leak in your application?

See also

Config files

Config files : Text4Shell Vulnerability

Config files

Config files : Incorrect directory deletion

Config files

Config files : Code injection