The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e072423883d2423883d2423883d2423883d2423883d
Symfony profiler enabled: https://18.177.83.124/_profiler/empty/search/results
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522079c1e36
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [submodule "application/third_party/facebook-php-sdk"] url = https://github.com/facebook/facebook-php-sdk.git [remote "origin"] url = ec2-user@dev.baby365.jp:/var/www/git/baby365-Server.git fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522079c1e36
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [submodule "application/third_party/facebook-php-sdk"] url = https://github.com/facebook/facebook-php-sdk.git [remote "origin"] url = ec2-user@dev.baby365.jp:/var/www/git/baby365-Server.git fetch = +refs/heads/*:refs/remotes/origin/*