Information Leakage
FortiAppSec Cloud can detect server error messages and other sensitive messages in the HTTP headers.
How Known Attacks settings affect Information Leakage
The Sensitivity Level configured under Signature Based Detection on the Security Rules > Known Attacks page directly influences how effectively FortiAppSec Cloud mitigates Information Leakage. This is because Sensitivity Level determines how many matching rules are applied to detect response headers and page content.
Higher sensitivity levels include more signatures that add additional protection but can also introduce false positives that may block legitimate traffic.
Configuring Sensitivity Level too low can leave critical Information Leakage vulnerabilities unblocked. For more information, see Known Attacks.
Configure Information Leakage protection
- Go to Security Rules > Information Leakage.
You must have already enabled this module in Add Modules. See Add and Remove Modules. - Configure these settings.
Server Information Disclosure
Enable to detect and erase server specific sensitive information in headers and response page, with no alerts generated.
Server-specific sensitive information includes information that could reveal known or potential vulnerabilities, such as software name/ version, backend technology frameworks and library versions, error messages, internal IP addresses, and authentication details
Personally Identifiable Information
Enable to detect and prevent the exposure of sensitive personal data, such as names, email addresses, and credit card numbers, in HTTP responses. It helps reduce the risk of data leaks by identifying PII patterns and allowing administrators to log, alert, or block such disclosures based on security policies.
Cloak Error Pages
Enable to replace HTTP 403 (Forbidden), 404 (Not Found), and 5XX (Server Errors) responses with a generic 500 (Internal Server Error) response.
This enhances security by preventing attackers from gathering information about your server through specific error responses that distinguish between missing pages, permission issues, or server failures, making it harder to map vulnerabilities.
You can add multiple HTTP headers in which the sensitive information will be hidden.Erase HTTP Headers
Enable to remove server response HTTP headers.
You can specify multiple HTTP headers in which the sensitive information will be hidden.
- Click +Create Exception Rule (optional).
You can also configure FortiAppSec Cloud to omit attack signature scans by creating exception rules. - Configure these settings.
Request Host Specify the host value (domain name) to match. For example,
www.test.comorapi.test.com.- If String Match is selected, is selected, enter the host name directly. Wildcards are supported (e.g.,
*.test.com). - If Regular Expression Match is selected, you can define a regex pattern to match one or more hostnames. For details, see Frequently used regular expressions.
Request URL
Specify a URL value to match. For example,
/testpage.php, which match requests forhttp://www.test.com/testpage.php.- If String Match is selected, ensure the value starts with a forward slash ( / ) (for example,
/testpage.php). You can enter a precise URL, such as /floder1/index.htm or use wildcards to match multiple URLs, such as /floder1/* ,or /floder1/*/index.htm. - If Regular Expression Match is selected, the value does not require a forward slash ( / ). However, ensure that it can match values that contain a forward slash. For details, see Frequently used regular expressions.
Do not include a domain name because it's by default the domain name of this application.
Parameter Name
Specify a parameter name to match. For example,
http://www.test.com/testpage.php?a=1, the parameter name is "a".Cookie Name
Specify a cookie name to match. Both String Match and Regular Expression Match are supported.
JSON Elements
Specify the name of the JSON element to match. Both String Match and Regular Expression Match are supported.
Attack Category
You can select an attack category between:
- Server Information Disclosure
- Personally Identifiable Information
Signature ID
The ID for the signature applied to the attack.
Signature Information
Signature description and examples are listed here. You can select any signature ID for the attack and view the signature details.

You must enable at least one of the following: Request URL or Parameter Name. The request matching the specified URL and/or parameter in exception rule would not be treated as an attack even if it matches a particular signature.
- If String Match is selected, is selected, enter the host name directly. Wildcards are supported (e.g.,
- Select the action that FortiAppSec Cloud takes when it detects a violation of the rule from the top right corner.
To configure the actions, you must first enable the Advanced Configuration in WAF > System Settings > Settings.Alert
Accept the request and generate a log message. To avoid log flooding, the minimum interval between logs is 1 second.
Erase & Alert
Hide or remove sensitive information in replies from the web server (sometimes called “cloaking”) and generate a log message. To avoid log flooding, the minimum interval between logs is 1 second.
Deny & Erase (no log)
For violations of the Server Information Disclosure, Cloak Error Pages, and the Erase HTTP Headers categories, hide or remove sensitive information in replies from the web server but do not generate log messages.
- Click SAVE.
You can continue creating multiple exception rules for specific attacks.