There is no direct impact, however this information can help an attacker identify other vulnerabilities or help during the exploitation of other identified vulnerabilities.
If it is a file required by the application, change its permissions to prevent public users from accessing it. If it is not, then remove it from the web server.
By using this website you agree with our use of cookies to improve its performance and enhance your experience. More information in our Privacy Policy.