Disclosure of github access token in config file via nignx off-by-slash
Critical
A
Adobe
Submitted None
Actions:
Reported by
letm3through
Vulnerability Details
Technical details and impact analysis
## Summary:
`██████████` is vulnerable to Nginx off-by-slash vulnerability that exposes Git configuration.
## Steps To Reproduce:
1. Visit `https://█████████████` to download git config containing username and token.
2. Use it to pull entire source code via `git clone ████████`
Leaked:
```
[core]
repositoryformatversion = 0
filemode = true
bare = false
logallrefupdates = true
[remote "origin"]
url = ████
fetch = +refs/heads/*:refs/remotes/origin/*
[branch "master"]
remote = origin
merge = refs/heads/master
[branch "vespa-2021-Q4"]
remote = origin
merge = refs/heads/vespa-2021-Q4
```
## Impact
Malicious attacker can mess around using the leaked github token to access and modify or even try to delete github repos that the token has permission to.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
Path Traversal