Webex App Keys
ID |
webex_app_keys |
Severity |
high |
Vendor |
Webex |
Family |
API Token |
Description
Webex by Cisco is a company that develops and sells web conferencing, videoconferencing, unified communications as a service, and contact center as a service applications.
Its API give programmatically access to Webex features and enable to integrate external services with it.
Security
Any hardcoded Webex Key is a potential secret reported by this detector.
Accidentally checking-in the key to source control repositories could compromise your Webex account.
Examples
webex_client = Qyv7nVW9UXmgZEy3TYjFaYGpVBB6Pgs4cDBcm89Lntdg4Zc3nCEVnV8AwTjhNYFZ5 webex_secret = hCyCxBMImjzRKsk6nLrRKpZjKJ9FxekwYTjRHnqaPhh5ch4BDPWX9hLNFMBs6Xp7-050GNIB_GNQLg6YwQ
Mitigation / Fix
-
Remove the
Key
from the source code or committed configuration file. -
Follow your policy for handling leaked secrets, which typically require revoking the secret in the target system(s). The secret can be regenerated using integration page in the My Webex App menu.
-
If under a git repository, you may remove unwanted files from the repository history using tools like
git filter-repo
orBFG Repo-Cleaner
. You may follow the procedure listed here for GitHub.
You should consider any sensitive data in commits with secrets as compromised. Remember that secrets may be removed from history in your projects, but not in other users' cloned or forked repositories. |