Open Source Web Security Platform
Open Source Web Security Platform
Classification Information
Resource /
Risk Medium
REQUEST
GET /?wordfence_syncAttackData=1607582289.6709vbscript:-->">'>'"
RESOURCE CONTENT
DISCUSSION
Vega has detected fragments of text that match signatures of application source code. Application source code
unintentedly visible to remote clients can be a security vulnerability. This can occur in applications using technologies
such as PHP and JSP, which allow for code to be mixed with static presentation content. For example, in-line code is
sometimes commented using HTML comments, resulting in it being transmitted to remote clients. For an attacker,
source code can reveal information about the nature of the application, such as its design or the use of third-party
components. Sometimes sensitive information, such as a database connection string, can be included in source
code.
IMPACT
REMEDIATION
The developer should verify that the output detected by Vega is in fact application source code.
The cause should be determined, and the material removed or prevented from being output.
REFERENCES
Top
Classification Information
Resource /%23wpcf7-f1488-o1
Risk Medium
REQUEST
RESOURCE CONTENT
DISCUSSION
Vega has detected fragments of text that match signatures of application source code. Application source code
unintentedly visible to remote clients can be a security vulnerability. This can occur in applications using technologies
such as PHP and JSP, which allow for code to be mixed with static presentation content. For example, in-line code is
sometimes commented using HTML comments, resulting in it being transmitted to remote clients. For an attacker,
source code can reveal information about the nature of the application, such as its design or the use of third-party
components. Sometimes sensitive information, such as a database connection string, can be included in source
code.
IMPACT
REMEDIATION
The developer should verify that the output detected by Vega is in fact application source code.
The cause should be determined, and the material removed or prevented from being output.
REFERENCES
Top