Loading HuntDB...

Disclosure of github access token in config file via nignx off-by-slash

Critical
A
Adobe
Submitted None
Reported by letm3through

Vulnerability Details

Technical details and impact analysis

Path Traversal
## Summary: `██████████` is vulnerable to Nginx off-by-slash vulnerability that exposes Git configuration. ## Steps To Reproduce: 1. Visit `https://█████████████` to download git config containing username and token. 2. Use it to pull entire source code via `git clone ████████` Leaked: ``` [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = ████ fetch = +refs/heads/*:refs/remotes/origin/* [branch "master"] remote = origin merge = refs/heads/master [branch "vespa-2021-Q4"] remote = origin merge = refs/heads/vespa-2021-Q4 ``` ## Impact Malicious attacker can mess around using the leaked github token to access and modify or even try to delete github repos that the token has permission to.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Path Traversal