Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-xh7v-965r-23f7: Atlantis Exposes Service Version Publicly on /status API Endpoint

Summary

Atlantis publicly exposes detailed version information on its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service’s security posture.

Details

The /status endpoint in Atlantis returns not only a health check but also detailed version and build information. This disclosure violates the principle of minimizing exposed sensitive metadata and can be leveraged by adversaries to correlate the version information with public vulnerability databases, including CVE listings. Although Atlantis is a public repository maintained by an external team, reducing this exposure can lessen the overall risk of targeted attacks.

For example, the source code handling the /status endpoint exposes version details that allow one to infer software dependencies and system configurations. Best practices, including guidelines from the OWASP Top 10 and recommendations discussed in NIST SP 800-53, advocate for restricting such potentially exploitable information.

PoC

  1. Issue a GET request to http://<atlantis-host>/status using a tool like curl or a web browser.
  2. Note that the API response includes detailed version and build information.
  3. Verify that no authentication is required to access the endpoint, leading to public exposure.
  4. Cross-reference the disclosed version with public vulnerability databases (e.g., NVD) for likely vulnerabilities.

Impact

The vulnerability falls under the category of information disclosure. Attackers could use the version details to scan public vulnerability repositories and tailor attacks based on known flaws in that particular version. This could potentially escalate into a broader compromise if the underlying software has exploitable vulnerabilities. Therefore, the affected parties include any users or administrators who rely on Atlantis, as well as the maintainers who are responsible for keeping the service secure.

CVS Severity Assessment

Based on the current circumstances, this issue is assessed as CVS Severity: LOW. However, if the disclosed version is known to contain critical vulnerabilities, the severity rating could be re-evaluated to Medium. It is recommended to restrict this information to safeguarded internal channels to mitigate the risk of targeted attacks.

ghsa
#vulnerability#web#auth

Summary

Atlantis publicly exposes detailed version information on its /status endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service’s security posture.

Details

The /status endpoint in Atlantis returns not only a health check but also detailed version and build information. This disclosure violates the principle of minimizing exposed sensitive metadata and can be leveraged by adversaries to correlate the version information with public vulnerability databases, including CVE listings. Although Atlantis is a public repository maintained by an external team, reducing this exposure can lessen the overall risk of targeted attacks.

For example, the source code handling the /status endpoint exposes version details that allow one to infer software dependencies and system configurations. Best practices, including guidelines from the OWASP Top 10 and recommendations discussed in NIST SP 800-53, advocate for restricting such potentially exploitable information.

PoC

  1. Issue a GET request to http://<atlantis-host>/status using a tool like curl or a web browser.
  2. Note that the API response includes detailed version and build information.
  3. Verify that no authentication is required to access the endpoint, leading to public exposure.
  4. Cross-reference the disclosed version with public vulnerability databases (e.g., NVD) for likely vulnerabilities.

Impact

The vulnerability falls under the category of information disclosure. Attackers could use the version details to scan public vulnerability repositories and tailor attacks based on known flaws in that particular version. This could potentially escalate into a broader compromise if the underlying software has exploitable vulnerabilities. Therefore, the affected parties include any users or administrators who rely on Atlantis, as well as the maintainers who are responsible for keeping the service secure.

CVS Severity Assessment

Based on the current circumstances, this issue is assessed as CVS Severity: LOW. However, if the disclosed version is known to contain critical vulnerabilities, the severity rating could be re-evaluated to Medium. It is recommended to restrict this information to safeguarded internal channels to mitigate the risk of targeted attacks.

References

  • GHSA-xh7v-965r-23f7

ghsa: Latest News

GHSA-xh7v-965r-23f7: Atlantis Exposes Service Version Publicly on /status API Endpoint