1.7 KiB
stage | group | info |
---|---|---|
Secure | Dynamic Analysis | To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments |
Exposure of information through directory listing
Description
The target web server is configured to list the contents of directories that do not contain an index file
such as index.html
. This could lead to accidental exposure of sensitive information, or give an attacker
details on how filenames and directories are structured and stored.
Remediation
Directory indexing should be disabled.
Apache:
For Apache based web sites, ensure all <Directory>
definitions have Options -Indexes
configured in the
apache2.conf
or httpd.conf
configuration file.
NGINX:
For NGINX based websites, ensure all location
definitions have the autoindex off
directive set in the
nginx.conf
file.
IIS:
For IIS based websites version 7.0 and above you can use the <directoryBrowse enabled="false" />
element
in the applicationHost.config
or Web.config
files.
For all other server types, please consult your product's documentation on how to disable directory indexing.
Details
ID | Aggregated | CWE | Type | Risk |
---|---|---|---|---|
548.1 | false | 548 | Passive | Low |