A GitHub token exposure led to the compromise of Mercedes-Benz’s source code, exposing sensitive internal data such as intellectual property, passwords, and cloud access keys.
The breach was linked to a GitHub token belonging to a Mercedes-Benz employee, discovered in a public repository on September 29th. Researchers at RedHunt Labs confirmed that this token granted unrestricted access to the car manufacturer’s internal GitHub Enterprise Server.
The leak exposed sensitive information such as database connection strings, cloud access keys, blueprints, design documents, single sign-on (SSO) passwords, API keys, and other critical internal details, as outlined in the RedHunt Labs report.
The vulnerability stemming from the leaked token could have allowed malicious actors to extract valuable intellectual property, reports, files, credentials, and more from Mercedes’ source code, posing a significant security risk.
Despite the token being leaked in September, researchers discovered it on January 11th, prompting Mercedes to revoke the token on January 24th. This delay suggests that unauthorized access to Mercedes’ GitHub Enterprise Server may have occurred unnoticed for several months.
“The exposure of the GitHub token linked to Mercedes-Benz’s GitHub Enterprise Server could potentially allow adversaries to access and exfiltrate the organization’s entire source code. Such access poses the risk of revealing highly sensitive credentials, potentially leading to a severe data breach against Mercedes-Benz,” the researchers warned.