Summary

Netsparker detected a possible RoR (Ruby on Rails) database configuration file on your web server.

Impact
Depending on the nature of the connection string disclosed, an attacker can mount one or more of the following types of attacks:
  • Access the database or other data resources. With the privileges of the account obtained; attempt to read, update or delete arbitrary data from the database.
  • Access password protected administrative mechanisms such as "dashboard", "management console" and "admin panel" potentially leading to full control of the application.
Actions To Take

Restrict access to this file or remove it from the web server.

Classifications
WASC-15, OWASP 2013-A5
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

Select Category

OR

Search Vulnerability

Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO