WS_FTP Log Found

Description

Kayran has detected a WS_FTP.LOG, which is a file created when using an FTP client called WS_FTP.
When people use WS_FTP to upload files to their website, they sometimes forget that, along with other files, WS_FTP.LOG file may be uploaded to the webserver, which makes it accessible and visible to anyone.

Since this file contain sensitive information regarding file meant to be hidden and their locations and directories found on the web root, as well as information about usernames and hostnames used in the site to enact certain actions.
In short, such vulnerability may lead to Information Disclosure, assisting attackers to conduct attacks against your assets.

Recommendation

Make sure this file, and other similar ones, are being either removed from your site. If removing them is not optional, access to them should be limited to authorized persons only.

References

https://cwe.mitre.org/data/definitions/200.html

https://cwe.mitre.org/data/definitions/538.html

< Return to all Vulnerabilities

Explaining API

We’ve talked about API’s Vulnerability in here, but i feel like there’s much more to talk about and explain since this is a big and

Read More »

What is a CWE ?

Similar to the article written on CVEs, in this article we will answer the questions :What is CWE ? and, what is the difference between

Read More »

What is Kayran

Kayran scanner is helping all businesses, both SMBs and enterprises, to test their online assets and products for over 30,000+ vulnerabilities.Kayran’s mission is to make

Read More »