Netsparker identified a stack trace disclosure (Ruby-Sinatra framework) in the target web server's HTTP response.

An attacker can obtain information such as:
  • Stack trace.
  • Physical file path of template file.
  • Information about the generated exception.
  • Internal IP address.
This information might help an attacker gain more information and potentially focus on the development of further attacks for the target system.
Configure your application not to provide detailed error pages in production environments. Save all information regarding the error to a backend storage, such as a log or a text file, and show a friendly custom error page to the user.
PCI v3.1-6.5.5, PCI v3.2-6.5.5, CAPEC-214, WASC-14, OWASP 2013-A5 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Vulnerability Index

Vulnerability Index

You can search and find all vulnerabilities

Search Category


Search Vulnerability