Netsparker identified a stack trace disclosure (ASP.NET) in the target web server's HTTP response.

An attacker can obtain information such as:
  • ASP.NET version.
  • Physical file path of temporary ASP.NET files.
  • Information about the generated exception and possibly source code, SQL queries, etc.
This information might help an attacker gain more information and potentially focus on the development of further attacks for the target system.
Apply following changes on your web.config file to prevent information leakage by applying custom error pages.
     <customErrors mode="On" defaultRedirect="~/error/GeneralError.aspx">
          <error statusCode="403" redirect="~/error/Forbidden.aspx" />
          <error statusCode="404" redirect="~/error/PageNotFound.aspx" />
          <error statusCode="500" redirect="~/error/InternalError.aspx" />
PCI v3.1-6.5.5, PCI v3.2-6.5.5, CAPEC-214, WASC-14, OWASP 2013-A5 , CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C