mirror of
https://github.com/dani-garcia/vaultwarden.git
synced 2025-12-09 09:13:02 +03:00
"PII Disclosure" issue impact our root domain being marked as Deceptive Content #830
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @saggafarsyad on GitHub.
Subject of the issue
In url <BASE_URL>/app/main.3a27378a743dd4ad9f70.js contains Credit Card Number "4242424242424242" which contains Personally Identifiable Information, such as CC number, SSN and similar sensitive data.
We suspect that this alert is a false alarm because the hardcoded text is intended as example or placeholder. But this PII Disclosure issue impact our root domain being marked as Deceptive content by Google and all our websites within subdomain were marked as Dangerous.
Solution
We tried replace "4242424242424242" to "42424242xxxxxxxx" on compiled file
/web-vault/app/main.3a27378a743dd4ad9f70.js, re-deploy and re-scan OWASP ZAP, then the issue is resolved.Deployment environment
Install method: Docker image
Clients used: Web Vault, Chrome Extensions
Reverse proxy and version: NGINX v1.24.0
MySQL/MariaDB or PostgreSQL version: N/A
Other relevant details: Web Vault Version 2023.3.0
Steps to reproduce
Expected behaviour
Actual behaviour
Troubleshooting data
@BlackDex commented on GitHub:
This is not something we can fix for one. This code is part of the Bitwarden Clients repo https://github.com/search?q=repo%3Abitwarden%2Fclients%2042424242&type=code .
Second, that is a known test credit-card number. So i suggest to create a ticket at the detection library and report to let it exclude this and maybe other well knows test numbers.