•Exact PHP version.
•Exact OS and its version.
•Details of the PHP configuration.
•Internal IP addresses.
•Server environment variables.
•Loaded PHP extensions and their configurations.
This information can help an attacker gain more information on the system. After gaining detailed information, the attacker can research known vulnerabilities for that system under review. The attacker can also use this information during the exploitation of other vulnerabilities. This lead me to discovering it's using Memcache and after reading Zephrfish's post, about the issue I was able to understand the issue more clearly. I connected using telnet to verify that i was able to easily access it and found that I was.