The system should only serve files with extensions within a specific list.
Servers usually host files that are required for their operation or that contain relevant technical information. These files should not be publicly accessible because the information they contain could be leveraged by an attacker in order to exploit other vulnerabilities. Configuring the server to serve only files with a specific extension helps prevent the unintentional disclosure of technical information.
This requirement is verified in following services
- Agile Alliance-11. Best architectures, requirements, and designs
- ISSAF-T_6_5. Web application assessment - Identifying web server vendor and version (by extension of pages on web server)
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.