Slack Token exposed over internet (Github)

Disclosed: 2019-07-11 13:58:21 By sanjogpanda To rocket_chat
None
Vulnerability Details
> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to verify and then potentially issue a bounty, so be sure to take your time filling out the report! **Summary:** Slack token is exposed in public github​ repositoty​ **Description:** [This file](https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml) on one of your github​ repos contains a Slack token for the R​ocketChat​ account. As noted in the official documentation, if this is to be published, it should be encrypted, which isn't the case here. ## Releases Affected: RCMarkdownParser file on the latest github​ master branch ## Steps To Reproduce (from initial installation to vulnerability): (Add details for how we can reproduce the issue) 1. Go to https://github.com/RocketChat/RCMarkdownParser/blob/1b8a052bcd38bcf459ecb6bb644daa7d70769434/.travis.yml 2. Notice the slack token present which can be used to access the account and communications. ## Supporting Material/References: Screenshot attached. ## Suggested mitigation Remove the slack token from the repo and also from the history ## Impact The token can be used to control the account and read internal communications.
Actions
View on HackerOne
Report Stats
  • Report ID: 386614
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report