CWE-527: Exposure of Version-Control Repository to an Unauthorized Control Sphere

Variant Incomplete Simple

CWE版本: 4.18

更新日期: 2025-09-09

弱点描述

The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferred, or otherwise made accessible to unauthorized actors.

扩展描述

Version control repositories such as CVS or git store version-specific metadata and other details within subdirectories. If these subdirectories are stored on a web server or added to an archive, then these could be used by an attacker. This information may include usernames, filenames, path root, IP addresses, and detailed "diff" data about how files have been changed - which could reveal source code snippets that were never intended to be made public.

常见后果

影响范围: Confidentiality

技术影响: Read Application Data Read Files or Directories

潜在缓解措施

阶段: Operation Distribution System Configuration

描述: Recommendations include removing any CVS directories and repositories from the production server, disabling the use of remote CVS repositories, and ensuring that the latest CVS patches and version updates have been performed.

引入模式

阶段 说明
Operation OMISSION: This weakness is caused by missing a security tactic during the architecture and design phase.
关键信息

CWE ID: CWE-527

抽象级别: Variant

结构: Simple

状态: Incomplete

相关弱点