正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token GitHub OAuth Access Token

Description

The response body contains content that matches the pattern of a GitHub OAuth Access Token was identified. Unlike a traditional OAuth token, user access tokens do not use scopes. Instead, it uses fine-grained permissions. A user access token only has permissions that both the user and the app have. If a malicious actor gains access to the token and the app was granted permission to write the contents of a repository, but the user can only read the contents, then the user access token can only read the contents. Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet. For more information, please see GitHubs documentation to revoke an OAuth access tokens. Also note, GitHub Apps are preferred over OAuth apps, please see GitHubs documentation for more details.

Details

IDAggregatedCWETypeRisk
798.53false798PassiveHigh