You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This file was found using the pattern ${fileName}.zip. Original filename: index.php
HTTP Request
GET /index.zip HTTP/1.1 Range: bytes=0-99999 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,br User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Host: testphp.vulnweb.com Connection: Keep-alive
Vulnerability Description
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.
Impact
Backup files can contain script sources, configuration files or other sensitive information that may help an malicious user to prepare more advanced attacks.
Remediation
Remove the file(s) if they are not required on your website. As an additional step, it is recommended to implement a security policy within your organization to disallow creation of backup files in directories accessible from the web.
Affects
http://testphp.vulnweb.com/index.zipAttack Details
This file was found using the pattern ${fileName}.zip.Original filename: index.php
HTTP Request
Vulnerability Description
A possible backup file was found on your web-server. These files are usually created by developers to backup their work.Impact
Backup files can contain script sources, configuration files or other sensitive information that may help an malicious user to prepare more advanced attacks.Remediation
Remove the file(s) if they are not required on your website. As an additional step, it is recommended to implement a security policy within your organization to disallow creation of backup files in directories accessible from the web.References:
The text was updated successfully, but these errors were encountered: