Description
The Kong Gateway provides API for accessing various information and configuring it. Acunetix determined that it was possible to access this API without authentication.
Remediation
Restrict access to the Kong Gateway API interface
References
Related Vulnerabilities
Access-Control-Allow-Origin header with wildcard (*) value
WordPress 3.7.x Multiple Vulnerabilities (3.7 - 3.7.39)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2008-1924)
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2010-3062)
Content Security Policy (CSP) Nonce Without Matching Script Block