Exposure of Sensitive Information to an Unauthorized Actor Affecting github.com/wolfi-dev/wolfictl/pkg/git package, versions <0.16.10


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    Exploit Maturity
    Proof of concept
    EPSS
    0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMWOLFIDEVWOLFICTLPKGGIT-6860242
  • published 16 May 2024
  • disclosed 15 May 2024
  • credit Dan Luhring

How to fix?

Upgrade github.com/wolfi-dev/wolfictl/pkg/git to version 0.16.10 or higher.

Overview

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor due to the GetGitAuth function. An attacker can access sensitive information by sending a GitHub token to remote servers other than github.com.

Notes:

  1. This impacts anyone who ran the wolfictl check update commands with a Melange configuration that included a git-checkout directive step that referenced a git repository not hosted on github.com.

  2. This also impacts anyone who ran wolfictl update with a remote URL outside of github.com.

  3. These subcommands must have run with the GITHUB_TOKEN environment variable set to a valid GitHub token.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
4.4 medium
  • Attack Vector (AV)
    Local
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    Low
  • User Interaction (UI)
    Required
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    High
  • Integrity (I)
    None
  • Availability (A)
    None