Loading HuntDB...

Slack Token exposed over internet (Github)

None
R
Rocket.Chat
Submitted None
Reported by sanjogpanda

Vulnerability Details

Technical details and impact analysis

Cleartext Storage of Sensitive Information
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty, so be sure to take your time filling out the report! **Summary:** Slack token is exposed in public github​ repositoty​ **Description:** [This file](https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml) on one of your github​ repos contains a Slack token for the R​ocketChat​ account. As noted in the official documentation, if this is to be published, it should be encrypted, which isn't the case here. ## Releases Affected: RCMarkdownParser file on the latest github​ master branch ## Steps To Reproduce (from initial installation to vulnerability): (Add details for how we can reproduce the issue) 1. Go to https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml 2. Notice the slack token present which can be used to access the account and communications. ## Supporting Material/References: Screenshot attached. ## Suggested mitigation Remove the slack token from the repo and also from the history ## Impact The token can be used to control the account and read internal communications.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Cleartext Storage of Sensitive Information