X-Git-Url: http://git.nikiroo.be/?p=gofetch.git;a=blobdiff_plain;f=test%2Fexpected%2FSLASHDOT%2F0102639752.header.html;fp=test%2Fexpected%2FSLASHDOT%2F0102639752.header.html;h=42bdf07805ec33c88ebb05df2e2013f19a9347f1;hp=d5c2ac8dd187e3958a8c5dbc456b5735ec091d13;hb=e818d449fee8a5397ab2f05df63bbeffc4c67dc0;hpb=a6a7ff9f2e7f42f17eaa69be2bfad201195b3eb4 diff --git a/test/expected/SLASHDOT/0102639752.header.html b/test/expected/SLASHDOT/0102639752.header.html index d5c2ac8..42bdf07 100644 --- a/test/expected/SLASHDOT/0102639752.header.html +++ b/test/expected/SLASHDOT/0102639752.header.html @@ -14,7 +14,7 @@ from the security-woes dept.)
- Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report: Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others. + Open .git directories are a bigger cybersecurity problem than many might imagine, at least according to a Czech security researcher who [1]discovered almost 400,000 web pages with an open .git directory possibly exposing a wide variety of data. From a report:

> Vladimir Smitka began his .git directory odyssey in July when he began looking at Czech websites to find how many were improperly configured and allow access to their .git folders within the file versions repository. Open .git directories are a particularly dangerous issue, he said, because they can contain a great deal of sensitive information. "Information about the website's structure, and sometimes you can get very sensitive data such as database passwords, API keys, development IDE settings, and so on. However, this data shouldn't be stored in the repository, but in previous scans of various security issues, I have found many developers that do not follow these best practices," Smitka wrote. Smitka queried 230 million websites to discover the 390,000 allowing access to their .git directories. The vast majority of the websites with open directories had a .com TLD with .net, .de, .org and uk comprising most of the others.



[1] https://www.scmagazine.com/home/news/400000-websites-vulnerable-through-exposed-git-directories/