Headline
GHSA-wpr2-j6gr-pjw9: OpenTofu potential leaking of secret variable values when using static evaluation in v1.8
Impact
Users who have opted into static evaluation of module sources, versions, and backend configurations may be at risk of exposing sensitive variables and locals. This is a workflow that should not be possible and explicitly show errors.
Workarounds
Check that you are not using sensitive variables in module sources and versions, as well as backend configurations. The patch will add explicit errors and prevent this from being possible.
Examples
variable "backend_path" {
type = string
sensitive = true
}
terraform {
backend "local" {
path = var.backend_path
}
}
variable "mod_info" {
type = string
sensitive = true
}
module "foo" {
source = var.mod_info
//version = var.mod_info
}
- GitHub Advisory Database
- GitHub Reviewed
- GHSA-wpr2-j6gr-pjw9
OpenTofu potential leaking of secret variable values when using static evaluation in v1.8
Low severity GitHub Reviewed Published Oct 3, 2024 in opentofu/opentofu • Updated Oct 3, 2024
Package
gomod github.com/opentofu/opentofu (Go)
Affected versions
>= 1.8.0, < 1.8.3
Impact
Users who have opted into static evaluation of module sources, versions, and backend configurations may be at risk of exposing sensitive variables and locals. This is a workflow that should not be possible and explicitly show errors.
Workarounds
Check that you are not using sensitive variables in module sources and versions, as well as backend configurations. The patch will add explicit errors and prevent this from being possible.
Examples
variable “backend_path” { type = string sensitive = true }
terraform { backend “local” { path = var.backend_path } }
variable “mod_info” { type = string sensitive = true }
module “foo” { source = var.mod_info //version = var.mod_info }
References
- GHSA-wpr2-j6gr-pjw9
Published to the GitHub Advisory Database
Oct 3, 2024