logo

Database

Description

The .map files are exposed, making it easy for a malicious actor to analyze the application.

Impact

Understand the inner workings of the application to generate new attack vectors.

Recommendation

Limit access of map files to authorized users and roles.

Threat

Unauthorized user from the Internet.

Expected Remediation Time

⏱️ 15 minutes.