Travis CI Disclosure
ID: travis-ci-disclosure
Severity: high
Author: DhiyaneshDK
Tags: exposure,file,config,tenable
Description
Section titled “Description”Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named .travis.yml in their source code repositories, developers can customize their applications build workflows.
YAML Source
Section titled “YAML Source”id: travis-ci-disclosure
info: name: Travis CI Disclosure author: DhiyaneshDK severity: high description: | Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows. remediation: | Ensure that the `.travis.yml` file is not deployed with the application or, at least, is not exposed in a web server directory by setting proper permissions on it. If sensitive information like credentials are leaked in the exposed file, they should be revoked and reset on the affected assets. reference: - https://github.com/maurosoria/dirsearch/blob/master/db/dicc.txt - https://arstechnica.com/information-technology/2021/09/travis-ci-flaw-exposed-secrets-for-thousands-of-open-source-projects/ - https://www.tenable.com/plugins/was/113156 metadata: verified: true max-request: 2 shodan-query: html:"travis.yml" tags: exposure,file,config,tenable
http: - method: GET path: - '{{BaseURL}}/.travis.yml' - '{{BaseURL}}/matomo/.travis.yml'
stop-at-first-match: true
matchers-condition: and matchers: - type: word part: body words: - 'before_script:' - 'jobs:' - 'language:' condition: and
- type: word part: header words: - "application/octet-stream"
- type: status status: - 200# digest: 4b0a00483046022100c0c5671eca8afa3cbf20a9886eb265e96eaad053f39df90a430ef76f6a58883b022100a066f58ecde5cfbd0e8f4c24991215f5132f95b5f1fee9c0a1c9cbd8b3e871b6:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/exposures/files/travis-ci-disclosure.yaml"