Disclosure of github access token in config file via nignx off-by-slash
Critical
Vulnerability Details
## Summary:
`██████████` is vulnerable to Nginx off-by-slash vulnerability that exposes Git configuration.
## Steps To Reproduce:
1. Visit `https://█████████████` to download git config containing username and token.
2. Use it to pull entire source code via `git clone ████████`
Leaked:
```
[core]
repositoryformatversion = 0
filemode = true
bare = false
logallrefupdates = true
[remote "origin"]
url = ████
fetch = +refs/heads/*:refs/remotes/origin/*
[branch "master"]
remote = origin
merge = refs/heads/master
[branch "vespa-2021-Q4"]
remote = origin
merge = refs/heads/vespa-2021-Q4
```
## Impact
Malicious attacker can mess around using the leaked github token to access and modify or even try to delete github repos that the token has permission to.
Actions
View on HackerOneReport Stats
- Report ID: 1386547
- State: Closed
- Substate: resolved
- Upvotes: 14