Apache Configuration File Detected

medium Web App Scanning Plugin ID 115129

Synopsis

Apache Configuration File Detected

Description

Apache configuration files may contain sensitive information about the web server and its environment. If an attacker is able to access these files, they may be able to gather information that could be used to exploit vulnerabilities in the web server or its applications.

Solution

Ensure that the configuration file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it.

See Also

https://httpd.apache.org/docs/2.4/configuring.html

Plugin Details

Severity: Medium

ID: 115129

Type: remote

Published: 2/11/2026

Updated: 2/11/2026

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information