logo

Database

Description

It is possible to obtain technical information such as: - System component versions (HTTP headers, service banner, etc.) - Specific information about the configuration of server components (php.ini, web.config)

Impact

Gather technical information to craft new attack vectors.

Recommendation

Remove web services and files that exposes technical information.

Threat

Anonymous attacker from the Internet.

Expected Remediation Time

⏱️ 60 minutes.