GHSA-xh7v-965r-23f7

Suggest an improvement
Source
https://github.com/advisories/GHSA-xh7v-965r-23f7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/09/GHSA-xh7v-965r-23f7/GHSA-xh7v-965r-23f7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xh7v-965r-23f7
Aliases
Downstream
Related
Published
2025-09-05T21:18:47Z
Modified
2025-09-17T17:27:09.968981Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
  • 2.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Atlantis Exposes Service Version Publicly on /status API Endpoint
Details

Summary

Atlantis publicly exposes detailed version information on its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture.

Details

The /status endpoint in Atlantis returns not only a health check but also detailed version and build information. This disclosure violates the principle of minimizing exposed sensitive metadata and can be leveraged by adversaries to correlate the version information with public vulnerability databases, including CVE listings. Although Atlantis is a public repository maintained by an external team, reducing this exposure can lessen the overall risk of targeted attacks.

For example, the source code handling the /status endpoint exposes version details that allow one to infer software dependencies and system configurations. Best practices, including guidelines from the OWASP Top 10 and recommendations discussed in NIST SP 800-53, advocate for restricting such potentially exploitable information.

PoC

  1. Issue a GET request to http://<atlantis-host>/status using a tool like curl or a web browser.
  2. Note that the API response includes detailed version and build information.
  3. Verify that no authentication is required to access the endpoint, leading to public exposure.
  4. Cross-reference the disclosed version with public vulnerability databases (e.g., NVD) for likely vulnerabilities.

Impact

The vulnerability falls under the category of information disclosure. Attackers could use the version details to scan public vulnerability repositories and tailor attacks based on known flaws in that particular version. This could potentially escalate into a broader compromise if the underlying software has exploitable vulnerabilities. Therefore, the affected parties include any users or administrators who rely on Atlantis, as well as the maintainers who are responsible for keeping the service secure.

CVS Severity Assessment

Based on the current circumstances, this issue is assessed as CVS Severity: LOW. However, if the disclosed version is known to contain critical vulnerabilities, the severity rating could be re-evaluated to Medium. It is recommended to restrict this information to safeguarded internal channels to mitigate the risk of targeted attacks.

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2025-09-05T21:18:47Z",
    "severity": "LOW",
    "cwe_ids": [
        "CWE-200"
    ],
    "nvd_published_at": "2025-09-06T20:15:30Z"
}
References

Affected packages

Go / github.com/runatlantis/atlantis

Package

Name
github.com/runatlantis/atlantis
View open source insights on deps.dev
Purl
pkg:golang/github.com/runatlantis/atlantis

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.35.1