Rapid7 Vulnerability & Exploit Database

Source Code Disclosure

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

Source Code Disclosure

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
12/31/1998
Created
07/25/2018
Added
06/17/2015
Modified
11/18/2015

Description

A server vulnerability can be exploited to read arbitrary files. This vulnerability can be used to reveal the source code of application files as well as display configuration files. Source code disclosure exposes sensitive application information such as input validation filters, database connection strings and queries, or hard-coded passwords.

An attacker with information about input validation filters may be able to craft a specific request that would bypass the filter.

Information about database connection strings exposes the user name and password used to access the database. Information about how database queries are constructed can help attackers create SQL injection exploits that pull specific information from the database.

Hard-coded passwords within configuration files or application source code may enable an attacker to access portions of the application that are otherwise restricted.

Solution(s)

  • appspider-source-code-disclosure

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;