What kind of vulnerability is it? Who is impacted?
Sample of template exposing server configuration using Sprig's env
function:
metadata:
template: true
steps:
- name: sample
image: alpine:latest
commands:
# OAuth client ID for Vela <-> GitHub communication
- echo {{ env "VELA_SOURCE_CLIENT" }}
# secret used for server <-> worker communication
- echo {{ env "VELA_SECRET" }}
Has the problem been patched? What versions should users upgrade to?
0.6.1
Is there a way for users to fix or remediate the vulnerability without upgrading?
If you have any questions or comments about this advisory:
{ "nvd_published_at": null, "github_reviewed_at": "2021-05-21T17:58:10Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-200", "CWE-78" ] }