2022 R3 Vulnerability on error response
- New
- How-to
-
Carmela Nasto
- PowerBuilder
- Thursday, 12 February 2026 03:54 PM UTC
Hi all,
Our client is requesting that we remediate the following vulnerability identified on an installation of Appeon Cloud 2022 R3.
Description: This vulnerability concerns the exposure of information that may be useful to an attacker, such as details regarding the technologies in use, within application pages or error messages. Such information may be disclosed when the server processes requests containing values that differ from those expected.
Evidence: In this case, the submission of unvalidated input through a POST request triggers an unhandled exception in the backend. As illustrated in attached image, the server response exposes sensitive details related to the technology stack and the syntax of the SQL queries employed.
Details related to the technology stack can be disabled through the IIS configuration, and we are aware of the procedure required to do so.
Is it possible to disable the exposure of application error details, such as the SQL queries employed?
Thanks a lot in advance
Find Questions by Tag
Helpful?
If a reply or comment is helpful for you, please don’t hesitate to click the Helpful button. This action is further confirmation of their invaluable contribution to the Appeon Community.