Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. Atlantis logs contains GitHub credentials (tokens `ghs_...`) when they are rotated. This enables an attacker able to read these logs to impersonate Atlantis application and to perform actions on GitHub. When Atlantis is used to administer a GitHub organization, this enables getting administration privileges on the organization. This was reported in #4060 and fixed in #4667 . The fix was included in Atlantis v0.30.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 08 Nov 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Atlantis is a self-hosted golang application that listens for Terraform pull request events via webhooks. Atlantis logs contains GitHub credentials (tokens `ghs_...`) when they are rotated. This enables an attacker able to read these logs to impersonate Atlantis application and to perform actions on GitHub. When Atlantis is used to administer a GitHub organization, this enables getting administration privileges on the organization. This was reported in #4060 and fixed in #4667 . The fix was included in Atlantis v0.30.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Git credentials are exposed in atlantis logs | |
Weaknesses | CWE-532 | |
References |
|
|
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-11-08T22:24:15.300Z
Updated: 2024-11-12T19:19:58.293Z
Reserved: 2024-11-04T17:46:16.779Z
Link: CVE-2024-52009
Vulnrichment
Updated: 2024-11-12T19:19:53.335Z
NVD
Status : Awaiting Analysis
Published: 2024-11-08T23:15:05.030
Modified: 2024-11-12T13:56:54.483
Link: CVE-2024-52009
Redhat
No data.