Looking for the vulnerability index of Invicti's legacy products?
.htaccess File Detected - Vulnerability Database

.htaccess File Detected

Description

An .htaccess file has been detected and is publicly accessible in this directory. Apache .htaccess files are configuration files intended to be processed by the web server, not served as downloadable content. When these files are directly accessible, they may expose sensitive configuration details including authentication requirements, URL rewrite rules, directory restrictions, and custom error pages that could aid attackers in reconnaissance and further exploitation.

Remediation

Configure the web server to prevent direct access to .htaccess files. For Apache servers, this protection is typically enabled by default, but verify the configuration includes the following directive in the main server configuration or virtual host:

<Files ".htaccess">
    Require all denied
</Files>

Alternatively, ensure the AccessFileName directive is properly configured and that AllowOverride is not set to allow unintended access. After making changes, restart the Apache service and verify the .htaccess file returns a 403 Forbidden response when accessed directly. Additionally, review the contents of exposed .htaccess files to determine if any sensitive information was disclosed and assess whether additional security measures are needed.

Related Vulnerabilities