Review the application documentation and any available source code; this includes configuration files such as global.asa, if present, scripts, HTML files, and any ASCII files.
Identify any instances of passwords, certificates, or sensitive data included in code.
If credentials were found, check the file permissions and ownership of the offending file.
If access to the folder hosting the file is not restricted to the related application process and administrative users, this is a finding.
The finding details should note specifically where the offending credentials or data were located and what resources they enabled. |