You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Description:
Spinnaker is an open source, multi-cloud continuous delivery platform. Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads. This only affects users of GitHub Status Notifications. This issue has been addressed in pull request 1316. Users are advised to upgrade. Users unable to upgrade should disable GH Status Notifications, Filter their logs for Echo log data and use read-only tokens that are limited in scope.
See doc/triage.md for instructions on how to triage this report.
modules:
- module: github.com/spinnaker/spinnaker
vulnerable_at: 0.83.0
packages:
- package: spinnaker
description: |-
Spinnaker is an open source, multi-cloud continuous delivery platform. Log
output when updating GitHub status is improperly set to FULL always. It's
recommended to apply the patch and rotate the GitHub token used for github
status notifications. Given that this would output github tokens to a log
system, the risk is slightly higher than a "low" since token exposure could
grant elevated access to repositories outside of control. If using READ
restricted tokens, the exposure is such that the token itself could be used to
access resources otherwise restricted from reads. This only affects users of
GitHub Status Notifications. This issue has been addressed in pull request 1316.
Users are advised to upgrade. Users unable to upgrade should disable GH Status
Notifications, Filter their logs for Echo log data and use read-only tokens that
are limited in scope.
cves:
- CVE-2023-39348
references:
- advisory: https://github.com/spinnaker/spinnaker/security/advisories/GHSA-rq5c-hvw6-8pr7
- fix: https://github.com/spinnaker/echo/pull/1316
The text was updated successfully, but these errors were encountered:
CVE-2023-39348 references github.com/spinnaker/spinnaker, which may be a Go module.
Description:
Spinnaker is an open source, multi-cloud continuous delivery platform. Log output when updating GitHub status is improperly set to FULL always. It's recommended to apply the patch and rotate the GitHub token used for github status notifications. Given that this would output github tokens to a log system, the risk is slightly higher than a "low" since token exposure could grant elevated access to repositories outside of control. If using READ restricted tokens, the exposure is such that the token itself could be used to access resources otherwise restricted from reads. This only affects users of GitHub Status Notifications. This issue has been addressed in pull request 1316. Users are advised to upgrade. Users unable to upgrade should disable GH Status Notifications, Filter their logs for Echo log data and use read-only tokens that are limited in scope.
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: