The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-6368 The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
Github GHSA Github GHSA GHSA-jxqv-jcvh-7gr4 Atlantis Events vulnerable to Timing Attack
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-17T02:53:19.536Z

Reserved: 2022-02-24T00:00:00

Link: CVE-2022-24912

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-29T10:15:12.557

Modified: 2024-11-21T06:51:22.570

Link: CVE-2022-24912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.