Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-wpr2-j6gr-pjw9: OpenTofu potential leaking of secret variable values when using static evaluation in v1.8

Impact

Users who have opted into static evaluation of module sources, versions, and backend configurations may be at risk of exposing sensitive variables and locals. This is a workflow that should not be possible and explicitly show errors.

Workarounds

Check that you are not using sensitive variables in module sources and versions, as well as backend configurations. The patch will add explicit errors and prevent this from being possible.

Examples

variable "backend_path" {
        type = string
        sensitive = true
}

terraform {
        backend "local" {
                path = var.backend_path
        }
}
variable "mod_info" {
        type = string
        sensitive = true
}

module "foo" {
        source = var.mod_info
        //version = var.mod_info
}
ghsa
#git
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-wpr2-j6gr-pjw9

OpenTofu potential leaking of secret variable values when using static evaluation in v1.8

Low severity GitHub Reviewed Published Oct 3, 2024 in opentofu/opentofu • Updated Oct 3, 2024

Package

gomod github.com/opentofu/opentofu (Go)

Affected versions

>= 1.8.0, < 1.8.3

Impact

Users who have opted into static evaluation of module sources, versions, and backend configurations may be at risk of exposing sensitive variables and locals. This is a workflow that should not be possible and explicitly show errors.

Workarounds

Check that you are not using sensitive variables in module sources and versions, as well as backend configurations. The patch will add explicit errors and prevent this from being possible.

Examples

variable “backend_path” { type = string sensitive = true }

terraform { backend “local” { path = var.backend_path } }

variable “mod_info” { type = string sensitive = true }

module “foo” { source = var.mod_info //version = var.mod_info }

References

  • GHSA-wpr2-j6gr-pjw9

Published to the GitHub Advisory Database

Oct 3, 2024

ghsa: Latest News

GHSA-78p3-fwcq-62c2: @saltcorn/server Remote Code Execution (RCE) / SQL injection via prototype pollution by manipulating `lang` and `defstring` parameters when setting localizer strings