Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-26294
HistoryJan 04, 2021 - 6:35 p.m.

CVE-2020-26294 Exposure of server configuration

2021-01-0418:35:14
CWE-78
GitHub_M
www.cve.org

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

53.4%

Vela is a Pipeline Automation (CI/CD) framework built on Linux container technology written in Golang. In Vela compiler before version 0.6.1 there is a vulnerability which allows exposure of server configuration. It impacts all users of Vela. An attacker can use Sprig’s env function to retrieve configuration information, see referenced GHSA for an example. This has been fixed in version 0.6.1. In addition to upgrading, it is recommended to rotate all secrets.

CNA Affected

[
  {
    "product": "compiler",
    "vendor": "go-vela",
    "versions": [
      {
        "status": "affected",
        "version": "< 0.6.1"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

53.4%

Related for CVELIST:CVE-2020-26294