exposed Git Repo at http://api.e2e-kops-aws-canary.test-cncf-aws.canary.k8s.io/.git/
High
K
Kubernetes
Submitted None
Actions:
Reported by
zevfw5pp
Vulnerability Details
Technical details and impact analysis
Dear Security team,
If this report is out of scope, please let me know and I will close the report myself
I found a git repository on http://api.e2e-kops-aws-canary.test-cncf-aws.canary.k8s.io/.git/.git. This endpoint allows an attacker to retrieve much of the source code and git history for this service which could potentially reveal sensitive information, it all depends what is stored there.
Example:
http://api.e2e-kops-aws-canary.test-cncf-aws.canary.k8s.io/.git/logs/HEAD
http://api.e2e-kops-aws-canary.test-cncf-aws.canary.k8s.io/.git/config
Mitigation
The restrict access (403 forbidden) are enabled only on /.git and not their subfolders. You just need to add all the git subfolders to the same rule.
Best Regards,
Daniel
## Impact
An attacker can get information just dumping data using .git repository.
Report Details
Additional information and metadata
State
Closed
Substate
Duplicate
Submitted
Weakness
Information Disclosure