Home / Vulnerability Database / Config files : php.ini: Information leak
Config files
Config files : php.ini: Information leak
Classification
OWASP Top 10 2013
OWASP Top 10 2017
PCI DSS 4.0
CWE/SANS Top 25 2021
Overview
System configuration information leak is possible. This can help an attacker to plan an attack.
The debug information and error messages depending on the system settings can be written to the log, displayed in the console, or sent to the user. In some cases, an attacker can make a conclusion about the vulnerabilities of the system based on an error message. For example, a database error can indicate the insecurity against attacks such as SQL injection. Information about the version of the operating system, application server and system configuration can also be valuable to the attacker.
References
- OWASP Top 10 2017-A3-Sensitive Data Exposure
- OWASP Top 10 2017-A6-Security Misconfiguration
- OWASP Top 10 2013-A5-Security Misconfiguration
- CWE-497: Exposure of System Data to an Unauthorized Control Sphere
- CWE CATEGORY: OWASP Top Ten 2017 Category A5 - Broken Access Control
- CWE CATEGORY: OWASP Top Ten 2017 Category A6 - Security Misconfiguration
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-209: Generation of Error Message Containing Sensitive Information
MEDIUM
DerScanner Severity Score
Do you want to fix Config files : php.ini: Information leak in your application?
See also
Config files
Config files : Text4Shell Vulnerability
Config files
Config files : Incorrect directory deletion
Config files
