Description
This web application is storing some connection strings in plaintext inside the web.config file. This is not recommended as an attacker might gain access to this file using a path traversal (or similar) vulnerabilities. It's recommended to use Protected Configuration to improve the security of your application by encrypting sensitive information that is stored in the web.config file.
Remediation
ASP.NET provides a feature called Protected Configuration, which enables you to encrypt sensitive information in a configuration file. It's recommended to use this feature to encrypt sensitive information that is stored in the web.config file.
References
Related Vulnerabilities
WordPress Plugin Easy Contact Forms Export 'file' Parameter Information Disclosure (1.1.0)
Unrestricted access to Prometheus
Web Cache Poisoning through HTTP/2 pseudo-headers
Verb tampering via misconfigured security constraint
GraphQL Array-based Query Batching Allowed: Potential Batching Attack Vulnerability