正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token GitLab personal access token

Description

The response body contains content that matches the pattern of a GitLab personal access token was identified. Personal access tokens can be used to access GitLab services as the user who created them. In most cases these tokens are given read-write access to all repositories. A malicious actor with access to this token can execute functionality on behalf of the user with the given permissions of the token. Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet.

To regenerate a personal access token:

  • Sign in to your GitLab account and access the User settings left-hand side menu, select “Access tokens”
  • Find the access token that was identified in the “Active personal access tokens” table
  • Note the permissions that were assigned to this token
  • Select the trash icon in the “Action” column of the token
  • When prompted, select “Revoke”

Details

IDAggregatedCWETypeRisk
798.56false798PassiveHigh