Looking for the vulnerability index of Invicti's legacy products?
Unauthorized Access to a web app installer - Vulnerability Database

Unauthorized Access to a web app installer

Description

An exposed web application installer has been detected that is accessible without authentication. Web application installers typically provide administrative setup capabilities and may allow unauthorized users to reconfigure the application, create administrative accounts, or modify critical settings. These installers should be removed or protected after initial deployment but are often left accessible in production environments.

Remediation

Immediately restrict access to the installer using one or more of the following methods:

1. Remove the installer: Delete the installer files and directories from the web server after the application has been properly configured. This is the most secure option.

2. Restrict access via web server configuration: Configure your web server to deny access to the installer path. For Apache, add to your .htaccess or virtual host configuration:

<Directory /path/to/installer>
    Require all denied
</Directory>
For Nginx, add to your server configuration:
location /installer {
    deny all;
    return 404;
}

3. Implement IP-based restrictions: If the installer must remain accessible, restrict access to trusted IP addresses only through web server configuration or firewall rules.

4. Verify removal: After implementing restrictions, verify that the installer is no longer accessible from external networks.

Related Vulnerabilities