PCI v3.2-6.5.5
CAPEC-214
CWE-248
HIPAA-164.306(a), 164.308(a)
ISO27001-A.18.1.3
WASC-14
OWASP 2013-A5
OWASP 2017-A6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Stack Trace Disclosure (Ruby-Sinatra Framework)

Severity:
Medium
Summary

Invicti identified a stack trace disclosure (Ruby-Sinatra framework) in the target web server's HTTP response.

Impact

An attacker can obtain information such as:

  • Stack trace.
  • Physical file path of template file.
  • Information about the generated exception.
  • Internal IP address.

This information might help an attacker gain more information and potentially focus on the development of further attacks for the target system.

Remediation

Configure your application not to provide detailed error pages in production environments. Save all information regarding the error to a backend storage, such as a log or a text file, and show a friendly custom error page to the user.

Required Skills for Successful Exploitation
Actions To Take
Vulnerability Index

You can search and find all vulnerabilities

Select Vulnerability
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Featured resources

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Blog

Strengthening enterprise application security: Invicti acquires Kondukto

Blog

Modern AppSec KPIs: Moving from scan counts to real risk reduction

Blog

Friends don’t let friends shift left: Shift smarter with DAST-first AppSec

Blog

Vibe talking: Dan Murphy on the promises, pitfalls, and insecurities of vibe coding

Build your resistance to threats. And save hundreds of hours each month.