Описание
Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. Atlantis logs contains GitHub credentials (tokens ghs_...) when they are rotated. This enables an attacker able to read these logs to impersonate Atlantis application and to perform actions on GitHub. When Atlantis is used to administer a GitHub organization, this enables getting administration privileges on the organization. This was reported in #4060 and fixed in #4667 . The fix was included in Atlantis v0.30.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Ссылки
- Technical Description
- Issue Tracking
- Issue Tracking
- Release Notes
- ExploitVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.30.0 (исключая)
cpe:2.3:a:runatlantis:atlantis:*:*:*:*:*:*:*:*
EPSS
Процентиль: 65%
0.00482
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-532
Связанные уязвимости
EPSS
Процентиль: 65%
0.00482
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-532