logo

Database

Description

It is possible to obtain source code from the application since it has only been partially obfuscated in a secure way. This could allow an attacker to understand the inner workings of the application.

Impact

- Understand the operation of the application in order to increase the attack vector. - Identify validations performed by the front end.

Recommendation

Perform an obfuscation process to the code exposed in web applications.

Threat

Unauthorized user from the Internet.

Expected Remediation Time

⏱️ 60 minutes.

Fixes