Common Files Detection

info Web App Scanning Plugin ID 98071

Synopsis

Common Files Detection

Description

Scanner has detected common sensitive files on the remote web server.

Web applications are often made up of multiple files and directories. It is possible that over time some files may become unreferenced (unused) by the web application and forgotten about by the administrator or developer. Because web applications are built using common frameworks, they contain common files that can be discovered (independent of server).

During the initial reconnaissance stages of an attack, cyber-criminals will attempt to locate unreferenced files in the hope that the file will assist in further compromise of the web application. To achieve this, they will make thousands of requests using word lists containing common filenames. The response headers from the server will then indicate if the file exists.

Solution

If files are unreferenced, then they should be removed from the web root and/or the application directory.
Preventing access without authentication may also be an option and can stop a client from being able to view the contents of a file; however, it is still likely that the directory structure will be able to be discovered.
Using obscure file names is implementing 'security through obscurity' and is not a recommended option.

See Also

http://httpd.apache.org/docs/2.0/mod/mod_access.html

http://nginx.org/en/docs/http/ngx_http_access_module.html

http://projects.webappsec.org/w/page/13246953/Predictable%20Resource%20Location

https://www.nginx.com/resources/admin-guide/restricting-access-auth-basic/

https://www.owasp.org/index.php/Forced_browsing

Plugin Details

Severity: Info

ID: 98071

Type: remote

Family: Web Servers

Published: 3/31/2017

Updated: 1/8/2024

Scan Template: api, basic, full, pci, scan