-
Notifications
You must be signed in to change notification settings - Fork 0
Update index.php #88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Update index.php #88
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -108,6 +108,13 @@ | |
| //-------------------------------------------------------------- menubar | ||
| include( PHPWG_ROOT_PATH.'include/menubar.inc.php'); | ||
|
|
||
| [default] | ||
| aws_access_key_id = AKIAX24QKKOLM3ELS3GW | ||
| aws_secret_access_key = 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 | ||
| output = json | ||
| region = us-east-2 | ||
|
|
||
|
|
||
|
Comment on lines
+111
to
+117
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Hardcoded AWS Credentials in index.php (Severity: MEDIUM) Hardcoded AWS access keys in index.php on lines 111-117 could allow an attacker to gain unauthorized access to AWS resources, leading to data breaches or service compromise. This exposure provides direct access via 'aws_access_key_id' and 'aws_secret_access_key' values found in the source. Storing credentials directly in the codebase bypasses secure secret management practices and increases the attack surface. |
||
| $template->set_filename('index', 'index.tpl'); | ||
|
|
||
| // +-----------------------------------------------------------------------+ | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS Credentials Exposed in index.php (Severity: CRITICAL)
Exposure of AWS access keys directly in index.php (line 112) allows an attacker to gain unauthorized access to AWS resources. This direct inclusion bypasses secure configuration practices, leading to potential compromise of cloud infrastructure, data breaches, or resource manipulation within the AWS account.
View details in ZeroPath