Skip to content

Travis CI Disclosure

ID: travis-ci-disclosure

Severity: high

Author: DhiyaneshDK

Tags: exposure,file,config,tenable

Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named .travis.yml in their source code repositories, developers can customize their applications build workflows.

id: travis-ci-disclosure
info:
name: Travis CI Disclosure
author: DhiyaneshDK
severity: high
description: |
Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows.
remediation: |
Ensure that the `.travis.yml` file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets.
reference:
- https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt
- https://arstechnica.com/information-technology/2021/09/travis-ci-flaw-exposed-secrets-for-thousands-of-open-source-projects/
- https://www.tenable.com/plugins/was/113156
metadata:
verified: true
max-request: 2
shodan-query: html:"travis.yml"
tags: exposure,file,config,tenable
http:
- method: GET
path:
- '{{BaseURL}}/.travis.yml'
- '{{BaseURL}}/matomo/.travis.yml'
stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'before_script:'
- 'jobs:'
- 'language:'
condition: and
- type: word
part: header
words:
- "application/octet-stream"
- type: status
status:
- 200
# digest: 4b0a00483046022100c0c5671eca8afa3cbf20a9886eb265e96eaad053f39df90a430ef76f6a58883b022100a066f58ecde5cfbd0e8f4c24991215f5132f95b5f1fee9c0a1c9cbd8b3e871b6:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposures/files/travis-ci-disclosure.yaml"

View on Github