OMFG.
Now that I understood this…… I can say that it was a fake and that I doubt the goodness of websecurify chrome plugin. Here the two disclosure errors:
Path Disclosure
Various system paths were disclosed within the application client source code or other files. This information could be used by attackers to make an educated guess about the application environment and any inherited weaknesses that may come with it.
solution: It is recommended to re-examine the system path disclosures and remove their reference from the application’s source code.
path: /home/kemu …
request: GET https://cga.cx/tag/code-2/ HTTP/1.1
=========
User Disclosure
Various usernames were disclosed within the application client source code or other files. This information could be used by attackers to attack the login mechanism on the application and supporting infrastructure.
solution: It is recommended to re-examine the username disclosures and remove their reference from the application’s source code.
user: home/kemu …
request: GET https://cga.cx/tag/code-2/ HTTP/1.1
=======
Now. I understand that those paths are really something standard on Linux… but these two are clearly two frikking false positives.
Navigate to that URL: https://cga.cx/tag/code-2/ , select this article https://cga.cx/2011/07/11/kvmms/ and see the two “disclosures” in the “kemu” links.
d’oh!!!