The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Additionally the GIT credentials are present and could give unauthorized access to source code repository of private projects.
Severity: critical
Fingerprint: 2580fa947178c88c8f88f4f64b143e4f192660cba91884022e566c81c72bc005
[init] defaultBranch = none [fetch] recurseSubmodules = false [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = http://gitlab-ci-token:ezzEj-Ciqt_pkEnhkVWC@47.94.201.210/bid/portal-web.git fetch = +refs/heads/*:refs/remotes/origin/*
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09c3c1fc5e93c1fc5e9aa3a36fcd26fe25cd8ac0c85d3c7f852
Found 5 files trough .DS_Store spidering: /data /favicon.ico /images /logo.png /templates
Open service 182.92.70.42:22
2025-01-06 15:46
Open service 182.92.70.42:22
2024-12-17 20:03