GHSA-RQ5C-HVW6-8PR7

Vulnerability from github – Published: 2023-08-29 17:35 – Updated: 2023-08-29 17:35
VLAI?
Summary
Improper log output when using GitHub Status Notifications in spinnaker
Details

Impact

ONLY IMPACTS those use GitHub Status Notifications

Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads.

Patches

Patch is in progress. https://github.com/spinnaker/echo/pull/1316

Workarounds

Disable GH Status Notifications. Filter your logs for Echo log data. Use read-only tokens that are limited in scope.

References

sig-security in slack: https://spinnakerteam.slack.com/archives/CFN8F5UR2

Show details on source website

{
  "affected": [
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c 1.28.8"
      },
      "package": {
        "ecosystem": "Go",
        "name": "github.com/spinnaker/spinnaker"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c 1.29.6"
      },
      "package": {
        "ecosystem": "Go",
        "name": "github.com/spinnaker/spinnaker"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "1.29.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c 1.30.3"
      },
      "package": {
        "ecosystem": "Go",
        "name": "github.com/spinnaker/spinnaker"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "1.30.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "database_specific": {
        "last_known_affected_version_range": "\u003c 1.31.1"
      },
      "package": {
        "ecosystem": "Go",
        "name": "github.com/spinnaker/spinnaker"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "1.31.0"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "aliases": [
    "CVE-2023-39348"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-532"
    ],
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-29T17:35:55Z",
    "nvd_published_at": "2023-08-28T20:15:08Z",
    "severity": "MODERATE"
  },
  "details": "### Impact\nONLY IMPACTS those use GitHub Status Notifications\n\nLog output when updating GitHub status is improperly set to FULL always.  It\u0027s recommended to apply the patch and rotate the GitHub token used for github status notifications.  Given that this would output github tokens to a log system, the risk is slightly higher than a \"low\" since token exposure could grant elevated access to repositories outside of control.  If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads.\n\n### Patches\nPatch is in progress.  https://github.com/spinnaker/echo/pull/1316\n\n### Workarounds\nDisable GH Status Notifications.  Filter your logs for Echo log data.  Use read-only tokens that are limited in scope.\n\n### References\nsig-security in slack: https://spinnakerteam.slack.com/archives/CFN8F5UR2\n",
  "id": "GHSA-rq5c-hvw6-8pr7",
  "modified": "2023-08-29T17:35:55Z",
  "published": "2023-08-29T17:35:55Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://github.com/spinnaker/spinnaker/security/advisories/GHSA-rq5c-hvw6-8pr7"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39348"
    },
    {
      "type": "WEB",
      "url": "https://github.com/spinnaker/echo/pull/1316"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/spinnaker/spinnaker"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ],
  "summary": "Improper log output when using GitHub Status Notifications in spinnaker"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…