Dear Doconut Team,
I hope you are doing well.
We are currently conducting a security assessment on our environment and have identified a potential Information Disclosure vulnerability related to the following endpoint:
/viewer/DocImage.axd
Based on the penetration testing report, this endpoint appears to expose internal operational details such as:
-
Product and version information (e.g., Doconut 1.0.3.8), it also appears in Doconut 25.9.0.0
-
Access timestamps
-
Page counts
-
Viewer type
-
Environment-related information
This data exposure allows external parties to fingerprint the system and correlate internal activity, which could be leveraged for targeted attacks.
We would highly appreciate your guidance on the following points:
-
What is the recommended approach to restrict or secure access to the
/DocImage.axdendpoint? -
Is there an available configuration or update to disable log/details exposure from this handler in production environments?
-
If the endpoint is required for viewer functionality, what is the best practice to enforce authentication and role-based authorization?
-
Are there any patches, security settings, or documentation that address this specific scenario?
Please advise on the proper remediation steps to ensure the endpoint does not expose sensitive operational details while maintaining required viewer functionality.
Thank you for your support. We look forward to your guidance.
Kind regards,