Vulnerability Description
The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Runatlantis | Atlantis | < 0.19.7 |
Related Weaknesses (CWE)
References
- https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d7PatchThird Party Advisory
- https://github.com/runatlantis/atlantis/issues/2391ExploitIssue TrackingThird Party Advisory
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUNATLANTISATLANTISSERVERCONTExploitIssue TrackingPatch
- https://github.com/runatlantis/atlantis/commit/48870911974adddaa4c99c8089e79b7d7PatchThird Party Advisory
- https://github.com/runatlantis/atlantis/issues/2391ExploitIssue TrackingThird Party Advisory
- https://security.snyk.io/vuln/SNYK-GOLANG-GITHUBCOMRUNATLANTISATLANTISSERVERCONTExploitIssue TrackingPatch
FAQ
What is CVE-2022-24912?
CVE-2022-24912 is a vulnerability with a CVSS score of 7.5 (HIGH). The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison f...
How severe is CVE-2022-24912?
CVE-2022-24912 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24912?
Check the references section above for vendor advisories and patch information. Affected products include: Runatlantis Atlantis.