Internal URL Disclosure

XMLWordPrintable

    • Type: Bug
    • Resolution: Unresolved
    • Priority: Medium
    • 3.6.1
    • Affects Version/s: 3.4.0

      An internal URL (such as an internal API endpoint, internal admin page, or server details) is being disclosed to unauthorized users. This information could be used by malicious actors to gain insights into the infrastructure or attack the system further.

      Vulnerability Name Vulnerable Point, Port or Parameter CVE/CWE CVSS Score Overall Risk
      (Severity)
      Mapping with OWASP Testing Checklist Observation / Description Impact Recommendation Reference Steps to reproduce
      Internal URL Disclosure https://uatamrit.piramalswasthya.org:8084/OpenKM/Download?uid= CWE-200: 5.2 Medium OWASP Configuration and Deploy Management Testing The application revealed internal server paths or URLs in its responses when files were accessed. This information disclosure could provide attackers with insights into the server structure, aiding in further attacks such as directory traversal, local file inclusion, or targeted file access. Exposure of internal directory structures assists attackers in crafting more precise and damaging attacks.
       
      Information leakage lowers the overall security posture and can lead to exploitation of underlying system vulnerabilities
      Mask or sanitize internal paths in responses to avoid disclosing server or directory information.
       
      Handle errors and file references in a generic manner without revealing server structure.
       
      Implement strict access controls on files and audit file handling endpoints regularly.
      https://owasp.org/www-project-top-ten/2017/A3_2017-Sensitive_Data_Exposure Step 1: During the security assessment, when accessing a file after uploading, it was observed that the server response disclosed the internal URL or file path.

            Assignee:
            Vanitha S
            Reporter:
            Shashank Kharkwal
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated: