Possible sensitive files
Unknown
Vulnerability Details
Possible sensitive files
Vulnerability description
A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one of these files could help an attacker to learn more about his target.
This vulnerability affects http://www.localize.io/.gitignore
View HTTP headers
Request
GET /.gitignore HTTP/1.1
Accept: acunetix/wvs
Cookie: PHPSESSID=5kj6m8e2d1kav3lecuftl59bd0
Host: www.localize.io
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
Response
HTTP/1.1 200 OK
Date: Fri, 18 Apr 2014 11:47:20 GMT
Server: Apache
Last-Modified: Tue, 14 Jan 2014 07:54:44 GMT
ETag: "635c54d-3d-4efe98162d900"
Accept-Ranges: bytes
Content-Length: 61
Keep-Alive: timeout=15, max=85
Connection: Keep-Alive
Content-Type: text/plain
The impact of this vulnerability
This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.
How to fix this vulnerability
Restrict access to this file or remove it from the website.
Web references
Web Server Security and Database Server Security
http://www.acunetix.com/websitesecurity/webserver-security/
Actions
View on HackerOneReport Stats
- Report ID: 8019
- State: Closed
- Substate: duplicate
- Upvotes: 5