Exposed .git/config File Leading to Potential Sensitive Information Disclosure

Disclosed: 2026-03-20 08:28:36 By zoroo2 To curl
Low
Vulnerability Details
## Summary: The .git/config file is publicly accessible on the target server, which may expose sensitive repository configuration details. This indicates that the .git directory is improperly exposed, potentially allowing attackers to reconstruct the entire source code repository and extract sensitive information. Although the website may not be explicitly listed in scope, this issue represents a significant security misconfiguration that could impact the organization’s infrastructure and code integrity. ## Steps To Reproduce: ``` curl "https://curl.se/dash/.git/config" -X GET -i -k -H "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" -H "User-Agent: Mozilla%2F5.0%20%28Windows%20NT%2010.0%3B%20Win64%3B%20x64%29%20AppleWebKit%2F537.36%20%28KHTML%2C%20like%20Gecko%29%20Chrome%2F141.0.0.0%20Safari%2F537.36" -H "Host: curl.se" -H "Connection: Keep-alive" ``` ## Additional Notes: Even if this specific asset is out of scope, exposed .git directories are widely recognized as misconfigurations and may still be considered under “good faith” reporting due to their security implications. ## POC {F5558707} ## Impact ## Summary: Exposure of internal repository configuration Remote repository URLs Developer usernames/emails Deployment structure Possibility to dump the full repository using publicly available tools Source code disclosure Credential leakage
Actions
View on HackerOne
Report Stats
  • Report ID: 3612891
  • State: Closed
  • Substate: not-applicable
Share this report