CWE-527
Exposure of Version-Control Repository to an Unauthorized Control Sphere
AI Translation Available
The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.
Status
incomplete
Abstraction
variant
Affected Platforms
Not Technology-Specific
Web Based
Extended Description
AI Translation
Version control repositories such as CVS or git store version-specific metadata and other details within subdirectories. If these subdirectories are stored on a web server or added to an archive, then these could be used by an attacker. This information may include usernames, filenames, path root, IP addresses, and detailed 'diff' data about how files have been changed - which could reveal source code snippets that were never intended to be made public.
Technical Details
AI Translation
Common Consequences
confidentiality
Impacts
read application data
read files or directories
Potential Mitigations
Phases:
operation
distribution
system configuration
Descriptions:
•
Recommendations include removing any CVS directories and repositories from the production server, disabling the use of remote CVS repositories, and ensuring that the latest CVS patches and version updates have been performed.