Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gv2h-gf8m-r68j

Опубликовано: 15 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.4

Описание

Exposure of server configuration in github.com/go-vela/server

Impact

What kind of vulnerability is it? Who is impacted?

Sample of template exposing server configuration using Sprig's env function:

metadata: template: true steps: - name: sample image: alpine:latest commands: # OAuth client ID for Vela <-> GitHub communication - echo {{ env "VELA_SOURCE_CLIENT" }} # secret used for server <-> worker communication - echo {{ env "VELA_SECRET" }}

Patches

Has the problem been patched? What versions should users upgrade to?

  • Upgrade to 0.6.1

Additional Recommended Action(s)

  • Rotate all secrets

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

  • No

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

github.com/go-vela/compiler

go
Затронутые версииВерсия исправления

< 0.6.1

0.6.1

EPSS

Процентиль: 57%
0.0035
Низкий

7.4 High

CVSS3

Дефекты

CWE-200
CWE-78

Связанные уязвимости

CVSS3: 7.4
nvd
около 5 лет назад

Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. In Vela compiler before version 0.6.1 there is a vulnerability which allows exposure of server configuration. It impacts all users of Vela. An attacker can use Sprig's `env` function to retrieve configuration information, see referenced GHSA for an example. This has been fixed in version 0.6.1. In addition to upgrading, it is recommended to rotate all secrets.

EPSS

Процентиль: 57%
0.0035
Низкий

7.4 High

CVSS3

Дефекты

CWE-200
CWE-78