Credential gets exposed
Low
P
Phabricator
Submitted None
Actions:
Reported by
luke081515
Vulnerability Details
Technical details and impact analysis
1. Create a repo
2. Mirror it to an URL
3. Assign a credential to the mirror
4. I've now had an existing repo, and wanted to change it to mirror only, so that phabricator pulls from an URL instead of self-hosting.
I now recived this error msg:
Pull of 'Luke081515Bot' failed: Working copy at "/srv/repos/LUKE" has a mismatched origin URI, "https://Luke081515:<redacted>@bitbucket.org/Luke081515/lukebot". The expected origin URI is "https://newUrl/Luke/Luke081515Bot.git". Fix your configuration, or set the remote URI correctly. To avoid breaking anything, Phabricator will not automatically fix this.
In this case the <redacted> part was my password for bitbucket, completly visible for everyone who is able to see the repo. Phabricator should not expose the whole URLs including passwords.
So in theory everyone who can edit a repo, but can't view a credential can get access to it by producing this git error and then see the password at the raw error.
Report Details
Additional information and metadata
State
Closed
Substate
Informative
Submitted
Weakness
Information Disclosure