Description
Magento stores its configuration in a file local.xml. Due to a misconfiguration of a web server, an attacker can access the cofiguration file.
Remediation
Restrict access to local.xml
References
Related Vulnerabilities
Axis development mode enabled in WEB-INF/server-config.wsdd
Web Cache Poisoning through HTTP/2 pseudo-headers
XML External Entity Injection via external file
WordPress Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-2202)
WordPress Plugin Sliced Invoices-WordPress Invoice Multiple Vulnerabilities (3.8.2)