JamesMaroney/x3sports

Possible Vulnerability

HKResearch opened this issue · 1 comments

Hello,

We are conducting research on the unintended exposure of secrets in GitHub repositories. In a recent scan we conducted of GitHub repositories, our tool detected that one of your repositories appears to expose a secret, and we've confirmed this possibility by manual inspection. The details are below:

# Branch: master
## File: x3sports/wordpress/wp-config.php
## Line: 22


# Branch: master
## File: x3sports/wordpress/wp-config.php
## Line: 25

If this information is indeed intended to be secret, we would recommend that you remove this file from the repository (using .gitignore) and generate new passwords for the vulnerable accounts. We would much appreciate a response, letting us know if we are mistaken in concluding that this is a secret, or if you made changes as a result of this report.

Thank you.

Thanks for the notice on this, I just added the file to .gitignore and
deleted it from the repo.

However, looking at the commits, one can still see the contents of the
deleted file. Is there any way to hide that?

Thanks,
Aaron

On Thu, Jul 3, 2014 at 1:11 PM, HKResearch notifications@github.com wrote:

Hello,

We are conducting research on the unintended exposure of secrets in GitHub
repositories. In a recent scan we conducted of GitHub repositories, our
tool detected that one of your repositories appears to expose a secret, and
we've confirmed this possibility by manual inspection. The details are
below:

Branch: master

File: x3sports/wordpress/wp-config.php

Line: 22

Branch: master

File: x3sports/wordpress/wp-config.php

Line: 25

If this information is indeed intended to be secret, we would recommend
that you remove this file from the repository (using .gitignore) and
generate new passwords for the vulnerable accounts. We would much
appreciate a response, letting us know if we are mistaken in concluding
that this is a secret, or if you made changes as a result of this report.

Thank you.


Reply to this email directly or view it on GitHub
#1.

Aaron Laibson
http://cleverandswift.com