236 – Technical information leak - SourceMap
Description
The .map files are exposed, making it easy for a malicious actor to analyze the application.
Impact
Understand the inner workings of the application to generate new attack vectors.
Recommendation
Limit access of map files to authorized users and roles.
Threat
Unauthorized user from the Internet.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: N
- Attack complexity: L
- Attack Requirements: N
- Privileges required: N
- User interaction: N
- Confidentiality (VC): L
- Integrity (VI): N
- Availability (VA): N
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P