| Details | |
|---|---|
| Alert ID | 200004-2 |
| Alert Type | Tool |
| Status | alpha |
| Risk | Medium |
| CWE | 527 |
| WASC | |
| Technologies Targeted | All |
| Tags |
CWE-527 OWASP_2021_A05 OWASP_2025_A02 TOOL_PTK |
Summary
Version control repositories such as CVS or git store version-specific metadata and other details within subdirectories. If these subdirectories are stored on a web server or added to an archive, then these could be used by an attacker. This information may include usernames, filenames, path root, IP addresses, and detailed ‘diff’ data about how files have been changed - which could reveal source code snippets that were never intended to be made public..
Generated by OWASP PTK DAST Module
Solution
Recommendations include removing any version control directories and repositories from the production server, disabling the use of remote version control repositories, and ensuring that the latest version control patches and version updates have been performed.Other Info
References
- https://owasp.org/Top10/2025/A02_2025-Security_Misconfiguration/
- https://cwe.mitre.org/data/definitions/527.html