Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions index.php
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,13 @@
//-------------------------------------------------------------- menubar
include( PHPWG_ROOT_PATH.'include/menubar.inc.php');

[default]
aws_access_key_id = AKIAX24QKKOLM3ELS3GW

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AWS Credentials Exposed in index.php (Severity: CRITICAL)

Exposure of AWS access keys directly in index.php (line 112) allows an attacker to gain unauthorized access to AWS resources. This direct inclusion bypasses secure configuration practices, leading to potential compromise of cloud infrastructure, data breaches, or resource manipulation within the AWS account.
View details in ZeroPath

aws_secret_access_key = QlXu5b4LI0d6z7OXEGhIfOHC4d9NjzCYRVDZ0Pnp
output = json
region = us-east-2


Comment on lines +111 to +117

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hardcoded AWS Credentials in index.php (Severity: MEDIUM)

Hardcoded AWS access keys in index.php on lines 111-117 could allow an attacker to gain unauthorized access to AWS resources, leading to data breaches or service compromise. This exposure provides direct access via 'aws_access_key_id' and 'aws_secret_access_key' values found in the source. Storing credentials directly in the codebase bypasses secure secret management practices and increases the attack surface.
View details in ZeroPath

$template->set_filename('index', 'index.tpl');

// +-----------------------------------------------------------------------+
Expand Down