Description
The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6368 | The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events. |
Github GHSA |
GHSA-jxqv-jcvh-7gr4 | Atlantis Events vulnerable to Timing Attack |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:53:19.536Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-24912
No data.
Status : Modified
Published: 2022-07-29T10:15:12.557
Modified: 2024-11-21T06:51:22.570
Link: CVE-2022-24912
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA