Lucene search

K
githubGitHub Advisory DatabaseGHSA-4MJX-2GH5-PH8H
HistoryOct 10, 2022 - 9:07 p.m.

Exposure of sensitive Slack webhook URLs in debug logs and traces

2022-10-1021:07:47
CWE-1258
GitHub Advisory Database
github.com
20
security
slack
webhooks
debug logs
patches
tracing
information exposure

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.7%

Impact

Debug logs expose sensitive URLs for Slack webhooks that contain private information.

Patches

The problem is fixed in v1.3.2 which redacts sensitive URLs for webhooks.

Workarounds

Disabling/filtering debug logs in case you use Slack webhooks using tracing log level and filters.

References

https://github.com/abdolence/slack-morphism-rust/releases/tag/v1.3.2

For more information

If you have any questions or comments about this advisory:

Affected configurations

Vulners
Node
slack_morphism_projectslack_morphismRange<1.3.2rust
VendorProductVersionCPE
slack_morphism_projectslack_morphism*cpe:2.3:a:slack_morphism_project:slack_morphism:*:*:*:*:*:rust:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

48.7%

Related for GHSA-4MJX-2GH5-PH8H