Description
The AASA file in the .well-known directory is a way for developers to force iOS users to open certain parts of a website in the corresponding app instead of the browser. Depending on its content, an attacker may find additional URLs and hidden endpoints, which aren't meant to be exposed, such as links that should only be visited by authenticated or privileged users. Additionally, the content of the file may aid an attacker during an initial reconnaissance phase.
Remediation
Be aware that the routes in these files are publicly accessible and make sure that the file or the routes do not contain any sensitive data.
References
Related Vulnerabilities
Oracle E-Business Suite iStore open user registration
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8669)
Apache Airflow Experimental API Auth Bypass CVE-2020-13927
WordPress Plugin RocketTheme RokBox Multiple Vulnerabilities (2.13)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6625)