Summary #

Netsparker identified a stack trace disclosure (Java) in the target web server's HTTP response.

Impact #
An attacker can obtain information such as:
  • Tomcat version.
  • Physical file path of Tomcat files.
  • Information about the generated exception.
This information might help an attacker gain more information and potentially focus on the development of further attacks to the target system.
Remediation #
Apply the following configuration to your web.xml file to prevent information leakage by applying custom error pages.
<error-page>
    <error-code>500</error-code>
    <location>/server_error.html</location>
</error-page>
Classifications #
PCI v3.1-6.5.5, PCI v3.2-6.5.5, CAPEC-214, CWE-248, HIPAA-248, ISO27001-A.18.1.3, WASC-14, OWASP 2013-A5, OWASP 2017-A6 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

OR

Search Vulnerability

Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO