Summary #

Netsparker detected a Possible Database Connection String on your web server.

Impact #
Depending on the nature of the connection string disclosed, an attacker can mount one or more of the following types of attacks:
  • Access the database or other data resources. With the privileges of the account obtained; attempt to read, update or delete arbitrary data from the database.
  • Access password protected administrative mechanisms such as "dashboard", "management console" and "admin panel" potentially leading to full control of the application.
Actions To Take #

Remove all the database connection strings on the public web pages.

Classifications #
CWE-16, HIPAA-16, ISO27001-A.18.1.3, WASC-15, OWASP PC-C7, OWASP 2013-A5, OWASP 2017-A3 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

OR

Search Vulnerability

Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO