The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522058a7b07
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true symlinks = false [remote "origin"] url = https://github.com/tutehub/sub_ptetrain_studyhub fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522058a7b07
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true symlinks = false [remote "origin"] url = https://github.com/tutehub/sub_ptetrain_studyhub fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522058a7b07
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true symlinks = false [remote "origin"] url = https://github.com/tutehub/sub_ptetrain_studyhub fetch = +refs/heads/*:refs/remotes/origin/*
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522058a7b07
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true symlinks = false [remote "origin"] url = https://github.com/tutehub/sub_ptetrain_studyhub fetch = +refs/heads/*:refs/remotes/origin/*
The following Moodle application is publicly accessible and looks out-dated :
It is highly recommended to update to a safe version as soon as possible since multiple CVEs allow remote attackers to craft XSS attacks leading to code execution on the server.
If the application was already patched, reloading the web server to clear the PHP opcache will fix issue.
Reference:
Severity: high
Fingerprint: 0b591a20d83e9bbda3370ce58008084480080844800808448008084480080844
Found vulnerable Moodle application: Affected by CVE-2023-30943