Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Git Credentials Disclosure

By kannthu

Medium
Vidoc logoVidoc Module
#exposure#config
Description

What is "Git Credentials Disclosure?"

The "Git Credentials Disclosure" module is designed to detect the exposure of Git credentials. It targets software that utilizes Git for version control. This module has a medium severity level and was authored by dhiyaneshDk.

Impact

If Git credentials are exposed, it can lead to unauthorized access to sensitive information, such as usernames and passwords. This can potentially result in data breaches, unauthorized code modifications, and other security risks.

How the module works?

The "Git Credentials Disclosure" module works by sending HTTP requests to specific paths, such as "/.git-credentials". It then applies matching conditions to determine if Git credentials are exposed. The matching conditions include:

- Checking if the response contains specific words, such as "https://" and "@github.com". - Verifying that the response status is 200 (OK). - Ensuring that the response header does not contain the word "text/html".

If all the matching conditions are met, the module reports a vulnerability.

Example HTTP request:

GET /.git-credentials

Please note that this module is part of the Vidoc platform and is used for scanning purposes to detect potential security risks.

Reference:

- https://github.com/detectify/ugly-duckling/blob/master/modules/crowdsourced/git-credentials-disclosure.json

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/.git-credentials
Matching conditions
word: https://, @github.comand
status: 200and
NOT word: text/html
Passive global matcher
No matching conditions.
On match action
Report vulnerability