Possible sensitive files

Disclosed: 2014-04-20 15:49:30 By 0xsaikiran To localize
Unknown
Vulnerability Details
Possible sensitive files Vulnerability description A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one of these files could help an attacker to learn more about his target. This vulnerability affects http://www.localize.io/.gitignore View HTTP headers Request GET /.gitignore HTTP/1.1 Accept: acunetix/wvs Cookie: PHPSESSID=5kj6m8e2d1kav3lecuftl59bd0 Host: www.localize.io Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36 Response HTTP/1.1 200 OK Date: Fri, 18 Apr 2014 11:47:20 GMT Server: Apache Last-Modified: Tue, 14 Jan 2014 07:54:44 GMT ETag: "635c54d-3d-4efe98162d900" Accept-Ranges: bytes Content-Length: 61 Keep-Alive: timeout=15, max=85 Connection: Keep-Alive Content-Type: text/plain The impact of this vulnerability This file may expose sensitive information that could help a malicious user to prepare more advanced attacks. How to fix this vulnerability Restrict access to this file or remove it from the website. Web references Web Server Security and Database Server Security http://www.acunetix.com/websitesecurity/webserver-security/
Actions
View on HackerOne
Report Stats
  • Report ID: 8019
  • State: Closed
  • Substate: duplicate
  • Upvotes: 5
Share this report