The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6368 | The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events. |
Github GHSA |
GHSA-jxqv-jcvh-7gr4 | Atlantis Events vulnerable to Timing Attack |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T02:53:19.536Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-24912
No data.
Status : Modified
Published: 2022-07-29T10:15:12.557
Modified: 2024-11-21T06:51:22.570
Link: CVE-2022-24912
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA