Skip to content

Security Test: Alibaba Canal Leak

Description

Default Severity:

This vulnerability happens when critical configuration details, like access and secret keys, are accidentally exposed in environments where they're not protected. When these keys get into the wrong hands, attackers might use them to access or manipulate data, compromise services, or move laterally within IT systems. Developers often fall into the trap of not securing configuration files properly and forgetting to scrub sensitive credentials before deployment, which can lead to these leaks. The risk is that an exposed key can give attackers full control over parts of your system, putting both your data and your users at significant risk if you're not careful about securing them.

Configuration

Identifier: information_disclosure/alibaba_canal_leak

Examples

All configuration available:

checks:
  information_disclosure/alibaba_canal_leak:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API8:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 8.2.1
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.12.6
NIST SP800-53
FedRAMP AC-6
CWE 200
CVSS Vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H