Skip to content
This repository has been archived by the owner on Oct 28, 2021. It is now read-only.

Exposure of server configuration

High
wass3r published GHSA-gv2h-gf8m-r68j Dec 30, 2020

Package

gomod compiler (Go)

Affected versions

< 0.6.1

Patched versions

0.6.1

Description

Impact

What kind of vulnerability is it? Who is impacted?

Sample of template exposing server configuration using Sprig's env function:

metadata:
  template: true

steps:
  - name: sample
    image: alpine:latest
    commands:
      # OAuth client ID for Vela <-> GitHub communication
      - echo {{ env "VELA_SOURCE_CLIENT" }}
      # secret used for server <-> worker communication
      - echo {{ env "VELA_SECRET" }}

Patches

Has the problem been patched? What versions should users upgrade to?

  • Upgrade to 0.6.1

Additional Recommended Action(s)

  • Rotate all secrets

Workarounds

Is there a way for users to fix or remediate the vulnerability without upgrading?

  • No

References

Are there any links users can visit to find out more?

For more information

If you have any questions or comments about this advisory:

Severity

High

CVE ID

CVE-2020-26294

Weaknesses

No CWEs

Credits