[REDACTED] publicly disclosing without authentication leaks SSH_key
Categories
(Infrastructure & Operations :: Infrastructure: Puppet, defect)
Tracking
(Not tracked)
People
(Reporter: pandeysachinbirendra, Unassigned)
Details
Attachments
(1 file)
299.06 KB,
image/jpeg
|
Details |
User Agent: Mozilla/5.0 (Linux; Android 9; SM-M307F) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.132 Mobile Safari/537.36
Steps to reproduce:
Hello Security Team,
Description :-
[JULIEN VEHENT] a Software developer from mozilla has left some severe information on github this data is very much important for your organisation.
This bug give attackers to get some critical information which makes the attacker to get entry into your database .
Steps to reproduce:-
You can find the following info in this links
Actual results:
GitHub is a truly awesome service but it is unwise to put any sensitive data in code that is hosted on GitHub and similar services as i was able to find github token and api_key release.
How to protect? (Important)
Avoid git add: commands: Using wildcards can easily capture local files not truly intended to be shared, Instead of wildcards, name each file you commit, or use git add -p to review each change you add.
Name sensitive files in .gitignore & .npmignore: git support a local file listing exclusions from packaging and commits, which you can use as a safety measure against the accidental inclusion of sensitive files, and you can use GitHub’s sample .gitignore files for other inspiration.
git-secrets: git hook prevents committing in credentials: a useful tool called git-secrets. The tool hooks onto git commit and breaks the commit if it includes patterns that appear to be credential. This is a good content-focused safety net, complementing the previously suggested filename based protection.
4.Encrypt or use environment vars when publishing from CI.
5.Invalidate leaked credentials.
Expected results:
Impact
I didn't try anything with the token, and dont know what access it has, and i know that in order to login to https://github.sc-corp.net you need to have an email @mozilla but still i though it would be a good idea to share this finding with you in case it can be used in a way that i dont know.
Thanks & Regards,
Sachin Pandey.
Comment 1•5 years ago
|
||
Julien, I imagine you did not just leave private keys around in a github repo and these are public keys?
Comment 2•5 years ago
|
||
Yes, these are public keys...
Updated•5 years ago
|
Reporter | ||
Comment 3•5 years ago
|
||
Can I know that i am eligible for bug bounty please?
Comment 4•5 years ago
|
||
Unfortunately, invalid bugs are not eligible for bounties.
Description
•