Loading HuntDB...

Git repository found

High
G
Grab
Submitted None
Reported by linkks

Vulnerability Details

Technical details and impact analysis

Information Disclosure
Git metadata directory (.git) was found in this folder. An attacker can extract sensitive information by requesting the hidden metadata directory that version control tool Git creates. The metadata directories are used for development purposes to keep track of development changes to a set of source code before it is committed back to a central repository (and vice-versa). When code is rolled to a live server from a repository, it is supposed to be done as an export rather than as a local working copy, and hence this problem. Repository files/directories: .gitignore README.md ansible/Vagrantfile ansible/development ansible/host_vars/development ansible/host_vars/production ansible/production ansible/provision.yml ansible/roles/common/files/id_rsa ansible/roles/common/tasks/main.yml GET /wp-content/themes/.git/config HTTP/1.1 Host: 54.255.134.3:443 Connection: Keep-alive Accept-Encoding: gzip,deflate User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21 Accept: */* These files may expose sensitive information that may help an malicious user to prepare more advanced attacks. Remove these files from production systems or restrict access to the .git directory. To deny access to all the .git folders you need to add the following lines in the appropriate context (either global config, or vhost/directory, or from .htaccess): <Directory ~ "\.git"> Order allow,deny Deny from all </Directory>

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Information Disclosure