This vulnerability occurs when a version control repository, like Git or SVN, is accidentally placed in a location accessible to unauthorized users, such as a web server directory or a public archive.
Version control systems use hidden directories (like .git or .svn) to store detailed project metadata. If these directories are exposed—often by being uploaded to a live web server or included in a deployment package—they become a goldmine for attackers. This metadata can contain sensitive information such as developer usernames, file system paths, internal IP addresses, and the complete history of code changes. Access to this repository data allows an attacker to reconstruct source code, including unpublished features or confidential code snippets from the change history ('diffs'). This exposure fundamentally bypasses access controls on the application's source, potentially revealing intellectual property, credentials, or other secrets that were never meant to leave the development environment.
Impact: Read Application DataRead Files or Directories