Insecure Code Management – Git

Insecure code management is when part of the code exposes sensitive information which shouldn’t be exposed to the world. Now it can happen in a lot of situation where the API keys/Passwords are hard-coded and it has been shared mistakenly by the developers. This article will cover the part of Git version control feature and how attackers can gain sensitive information if it is exposed in .git directories of the webservers. We will make use of root-me challenge “Insecure code Management” as an example.

Root-Me challenge can be found here: https://www.root-me.org/en/Challenges/Web-Server/Insecure-Code-Management

Let’s get this started:

This Challenge will present you with a web-App. There is not much information on the first page and it will ask you to enter login information:

A quick dirb check will give you /.git. You can use wget or HTTrack to download the files and sub-directories.

-- wget -r http://challenge01.root-me.org/web-serveur/ch61/.git/

-- httrack -get http://challenge01.root-me.org/web-serveur/ch61/.git/

 

Once downloaded, go to the .git directory and check the git log, that will give you information on the commits that has happened and gives you a history of the changes that has been done to the repository.

 

Now, we know changes has been made on the passwords and also that the password is in MD5 hash.

Let’s check the change status by using command : git status

The file config.php and index.php are the once that are deleted. Mostly when setting up a webApp, the DB passwords and the application passwords are stored in the config.php file. What we need to do now is to either restore this file or to checkout these files.

The next command I have used is : “git restore config.php” which gave me the required password.

The above hash can be checked against MD5 decryptor and we can get the relevant string.

The above approach is a manual one can be automated with plenty of tools out there. But the one I found pretty useful in such scenarios is “gittyleaks”.

You can find more information on this tools here: https://github.com/kootenpv/gittyleaks

To make use of this tool, all you require to do is to run it in the .git directory and it will fetch out any sensitive information it can find based on sensitive words and known conditions.

For the above challenge, below is the information the gittyleaks fetched for me:

 

%d bloggers like this: