正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token GitLab OAuth application secret

Description

The response body contains content that matches the pattern of a GitLab OAuth application secret was identified. OAuth secrets are used when allowing users to sign in to your application. Depending on the scopes assigned, a malicious actor could impersonate the service to access their repositories or data. Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet.

To regenerate an OAuth secret:

  • Sign in to your GitLab account and access the User settings left-hand side menu, select “Applications”
  • Find the application that uses the identified token and select the name link in the “Name” column - Select “Renew secret” in the application details page
  • When prompted, select “Renew secret”

For more information, please see GitLabs documentation on configuring an OAuth 2.0 provider

Details

IDAggregatedCWETypeRisk
798.146false798PassiveHigh