Looking for the vulnerability index of Invicti's legacy products?
CVS Detected - Vulnerability Database

CVS Detected

Description

A CVS (Concurrent Versions System) repository directory has been detected on this web server. CVS directories contain metadata files that should never be publicly accessible, including CVS/Entries (listing all tracked files and directories), CVS/Repository (containing the repository path), and CVS/Root (containing the repository location). The presence of these files indicates that version control metadata is being inadvertently exposed through the web server.

Remediation

Immediately remove all CVS directories and metadata files from production web servers. Follow these steps:

1. Remove CVS directories from the web root:

find /var/www/html -type d -name CVS -exec rm -rf {} +

2. Configure web server to deny access to version control directories:

For Apache, add to .htaccess or httpd.conf:
RedirectMatch 404 /\..*$
RedirectMatch 404 /CVS/.*$

For Nginx, add to server configuration:
location ~ /\.|\/CVS\/ {
    deny all;
    return 404;
}

3. Implement proper deployment procedures: Use export or clean checkout processes that exclude version control metadata when deploying to production environments.

4. Verify removal: Scan your web applications to confirm no CVS directories remain accessible via HTTP/HTTPS requests.

Related Vulnerabilities