Often associated to the Directory Indexing, this vulnerability aims at recovering the sensitive files located on a server.
14 days Free trial
No Commitment
The targeted files are often configuration files that contain critical information for the operation of the application or website. The attacker can access this type of files if the server is not properly configured. For example, if access to indexes has not been blocked, the attacker can easily access to the sensitive files.
To avoid this type of vulnerability, you must follow the same procedure used for the Directory Indexing vulnerability.
Detect security flaws on your website or web application thanks to the Web Vulnerability Scanner of HTTPCS. This online security tool allows you to detect any flaws you have (top 10 OWASP, CVE and other vulnerabilities implemented in the robot) to ensure the best protection of your site on a daily basis. Easily schedule automated audits, discover your vulnerabilities and find out what patches to apply to avoid being hacked.
14 days Free trial
No Commitment