Hubspot Webhook

ID

hubspot_webhook

Severity

low

Vendor

Hubspot

Family

Generic secret

Description

Hubspot’s webhook URLs allows to send POST or GET requests from your workflows. There are a variety of uses for webhooks, examples of popular use cases for webhooks include:

  • Posting HubSpot contacts data to another system, such as a CRM, when that contact fills out a particular form on your site.

  • Sending deal data to an external shipment-handling system to create a purchase order.

  • Sending chat alerts from your external system to your company’s chat stream to notify employees that something important has occurred.

  • Retrieving data from another system to update your HubSpot records.

Security

The attacker could see your application ID and use it for malicious purposes.

Examples

https://api.hubapi.com/webhooks/v3/MyAppId/settings

Mitigation / Fix

  1. Remove the URL from the source code or committed configuration file.

  2. Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s).

  3. If under a git repository, you may remove unwanted files from the repository history using tools like git filter-repo or BFG Repo-Cleaner. You may follow the procedure listed here for GitHub.

You should consider any sensitive data in commits with secrets as compromised.

Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories.

  1. Check access logs to ensure that the secret was not used by unintended actors during the compromised period.