Information leakage occurs when a website reveals information that could aid an attacker to further exploit the system. This information may or may not be sensitive and does not automatically mean a breach is likely to occur. Overall, any information that could be used for an attack should be limited whenever possible.
The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally controllable, such as hidden form fields.
Link | Tags |
---|---|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0097430 | vendor advisory |