2 vulnerabilities classified as CWE-527 (将CVS仓库暴露给非授权控制范围). AI Chinese analysis included.
CWE-527 represents a critical information disclosure weakness where version control repositories, such as Git or CVS, are inadvertently exposed to unauthorized actors. This vulnerability typically arises when developers deploy application code without excluding hidden metadata directories like .git or .svn, leaving them accessible via web servers or included in public archives. Attackers exploit this by directly accessing these exposed directories to retrieve sensitive source code, configuration files, and commit history, which often contain hardcoded credentials, API keys, and internal architectural details. To prevent this, developers must rigorously configure their deployment pipelines to exclude version control artifacts. Utilizing .gitignore files, implementing server-side rules to deny access to hidden directories, and conducting regular security audits ensure that sensitive repository data remains isolated from the public internet, thereby protecting intellectual property and preventing credential leakage.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-20931 | Cisco Touch 10 Device Downgrade Attack Vulnerability — Cisco TelePresence Endpoint Software (TC/CE) | 6.5 | Medium | 2024-11-15 |
| CVE-2021-21423 | Exposure of Version-Control Repository to an Unauthorized Control Sphere in projen — projen | 6.8 | Medium | 2021-04-06 |
Vulnerabilities classified as CWE-527 (将CVS仓库暴露给非授权控制范围) represent 2 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.