Source code disclosed via S3 Bucket
High
R
Ruby
Submitted None
Actions:
Reported by
thevillagehack3r
Vulnerability Details
Technical details and impact analysis
### Summary
The Ruby having an Amazon S3 bucked named `http://rubyci.s3.amazonaws.com/` which lists some of their log files. Those logs having some informations to check the source code server side directories.
### Steps to Reproduce
1. direct to `http://rubyci.s3.amazonaws.com/` which having **READ** Permission to all Objects hosted in that bucket
{F691099}
2. Can also able to access aws-cli through `aws s3 ls s3://rubyci`
3. direct to one of the object named ***last.txt*** as ` http://rubyci.s3.amazonaws.com/aix71_ppc/ruby-2.1/last.txt `
{F691108}
4. scroll down and a line shown which directs to source code directory link `http://svn.ruby-lang.org/repos/ruby/branches/` that is a initial directory for all source codes
5. I can check and view each and every source codes of all ruby versions
### POC
## Video
{F691114}
## Impact
- The attacker can able to read any aws authorized object and use those informations to do potential attacks
- The source codes having some sensitive informations so the attacker can do impact to ruby codes that may cause major attack on users.
Report Details
Additional information and metadata
State
Closed
Substate
Not-Applicable
Submitted
Weakness
Information Exposure Through Directory Listing