The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c88c8f88f4f64b143e4f192660cba9188402754dcfae5b4a9852
[init] defaultBranch = none [fetch] recurseSubmodules = false [http "https://gitlab.azemco.ir"] sslCAInfo = /home/gitlab-runner/builds/Y7sZnxYy/0/saeedaliyan/hamcall-va-backend.tmp/CI_SERVER_TLS_CA_FILE [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab-ci-token:dyEg5VMdtqNYACE2c7i4@gitlab.azemco.ir/saeedaliyan/hamcall-va-backend.git fetch = +refs/heads/*:refs/remotes/origin/*
Severity: critical
Fingerprint: 2580fa947178c88c8f88f4f64b143e4f192660cba9188402754dcfaeca5a4d1a
[init] defaultBranch = none [fetch] recurseSubmodules = false [http "https://gitlab.azemco.ir"] sslCAInfo = /home/gitlab-runner/builds/Y7sZnxYy/0/saeedaliyan/hamcall-va-backend.tmp/CI_SERVER_TLS_CA_FILE [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab-ci-token:vv6mDzwiQsGpzYonJW2z@gitlab.azemco.ir/saeedaliyan/hamcall-va-backend.git fetch = +refs/heads/*:refs/remotes/origin/*
The following Gitlab instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible to avoid account takeover.
Severity is mitigated by the need of a valid email address.
Reference:
Severity: high
Fingerprint: db64c48d331961cce5776b3a892edddd892edddd892edddd892edddd892edddd
Found vulnerable Gitlab instance Affected by CVE-2023-7028