Publicly accessible config, backup, or log file found
-
We just scanned one of our websites https://newszetu.com and found a Publicly accessible config, backup, or log file found and on the scan dashboard we chose to delete all deletable files. The issues we want to clarify are:
1.Does deleting the action of deleting deletable files remove the vulnerability posed by the publicly available file?
2. If any attack had occurred prior to this action and before implementing full security headers (which we have now implemented) does this action remove the files that may have been uploaded.
3.What other actions can we take to ensure future attackes do not happen.Furher how do we ensure that any prior attackes that may have occurred are completely removed?
- The topic ‘Publicly accessible config, backup, or log file found’ is closed to new replies.