GO-2022-0534

Source
https://pkg.go.dev/vuln/GO-2022-0534
Import Source
https://vuln.go.dev/ID/GO-2022-0534.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2022-0534
Aliases
Published
2022-08-11T20:54:51Z
Modified
2024-05-20T16:03:47Z
Summary
Timing attack in github.com/runatlantis/atlantis
Details

Validation of Gitlab requests can leak secrets.

The package github.com/runatlantis/atlantis/server/controllers/events uses a non-constant time comparison for secrets while validating a Gitlab request. This allows for a timing attack where an attacker can recover a secret and then forge the request.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2022-0534"
}
References
Credits
    • cedws

Affected packages

Go / github.com/runatlantis/atlantis

Package

Name
github.com/runatlantis/atlantis
View open source insights on deps.dev
Purl
pkg:golang/github.com/runatlantis/atlantis

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.19.7

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/runatlantis/atlantis/server/controllers/events",
            "symbols": [
                "DefaultGitlabRequestParserValidator.ParseAndValidate"
            ]
        }
    ]
}