circleci config.yml exposure
Attacker can get unauthorized access to the CircleCI config.yml file.
Security Misconfiguration (SM)
How this template works
The API selection filters in this template specify the criteria for selecting the API endpoint to be tested. In this case, the filters include the response code range (between 200 and 299) and the extraction of the URL as a variable called "urlVar".
The execute section defines the type of request to be executed, which is a single request in this case. It also specifies the modifications to be made to the URL by appending "/.circleci/config.yml" and enabling follow redirects.
The validation section defines the criteria for validating the response received from the API endpoint. It checks that the response code is equal to 200 and that the response payload contains both the strings "version" and "jobs".
Frequently asked questions
What is the purpose of the "CircleCI Config.yml Exposure" vulnerability test
How does the test determine if the CircleCI config.yml file is exposed
What is the impact of exposing the CircleCI config.yml file
What category and subcategory does this vulnerability fall under
What is the severity level of this vulnerability
Are there any references or resources available for further information on this vulnerability