正式なドキュメントは英語版であり、この日本語訳はAI支援翻訳により作成された参考用のものです。日本語訳の一部の内容は人間によるレビューがまだ行われていないため、翻訳のタイミングにより英語版との間に差異が生じることがあります。最新かつ正確な情報については、英語版をご参照ください。

Exposure of confidential secret or token Heroku API key or application authorization token

Description

The response body contains content that matches the pattern of a Heroku API key or application authorization token was identified. API keys and authorization tokens can be used to perform API calls on behalf of a user or account. A malicious actor with access to these tokens can access the Heroku API platform and all deployed applications. Exposing this value could allow attackers to gain access to all resources granted by this token.

Remediation

For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet.

To regenerate an API key for the identified user:

  • Sign in to your account and visit https://dashboard.heroku.com/account
  • Under the “API Key” section, select “Regenerate API Key”
  • When prompted, select “Regenerate API Key” in the “Regenerate API Key” dialog

To regenerate an application authorization token:

For more information on API keys, see their FAQ on generating API keys. Heroku does not have any documentation on application authorization tokens.

Details

IDAggregatedCWETypeRisk
798.59false798PassiveHigh