doc/user/application_security/dast/browser/checks/798.3.md
The response body contains content that matches the pattern of an Adobe client secret was detected. Adobe client secrets are used to connect to various API or webhook event based services. Depending on which type of service was defined for a project, a malicious actor with access to the secret can use it to gain access to various APIs or events that may contain sensitive information. Exposing this value could allow attackers to gain access to all resources granted by this token.
For general guidance on handling security incidents with regards to leaked keys, please see the GitLab documentation on Credential exposure to the internet. Remediation steps depend on which type of client secret was leaked, please see the following types of remediation steps below and use the one that applies to the secret that was detected.
OAuth (Server-to-Server):
OAuth Web App (Event based project):
OAuth Web App (API Service based project):
| ID | Aggregated | CWE | Type | Risk |
|---|---|---|---|---|
| 798.3 | false | 798 | Passive | High |