Insecure S3 Bucket Exposing Git Directory in Mozilla Foundation Infographics Project

Disclosed: 2024-03-13 14:45:45 By psycho_012 To mozilla
Low
Vulnerability Details
## Summary I discovered an insecure S3 bucket associated with the Mozilla Foundation's Infographics project. While the bucket itself is inaccessible, the DotGit extension alerted me that the `/.git` directory is accessible. I was able to use the GitDump tool to dump the entire directory. ## Details **Repository Link:** [Mozilla Foundation Infographics](https://github.com/MozillaFoundation/mofo-infographics#:~:text=https%3A//mofo%2Dinfographics.s3.amazonaws.com/projects/%3Claunch%20date%3E%2D%3Cproject%2Dname%2Dwith%2Dhypens%3E/index.html) **S3 Bucket:** [mofo-infographics.s3.amazonaws.com](https://mofo-infographics.s3.amazonaws.com) ## Steps to Reproduce 1. Open terminal and enter `git clone https://github.com/Ebryx/GitDump.git` 2. Navigate to the GitDump directory with `cd GitDump` 3. Run the GitDump tool with `python3 ./git-dump.py https://mofo-infographics.s3.amazonaws.com/` 4. Navigate to the output directory with `cd output/.git` 5. Observe that all files have been dumped ##POC █████████ ## Impact The exposure of the `/.git` directory can lead to unauthorized access to sensitive information, such as source code, configuration files, and potentially secrets or credentials stored in the repository.
Actions
View on HackerOne
Report Stats
  • Report ID: 2383486
  • State: Closed
  • Substate: resolved
  • Upvotes: 49
Share this report