Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS13cHIyLWo2Z3ItcGp3Oc4AA_7y
OpenTofu potential leaking of secret variable values when using static evaluation in v1.8
Impact
Users who have opted into static evaluation of module sources, versions, and backend configurations may be at risk of exposing sensitive variables and locals. This is a workflow that should not be possible and explicitly show errors.
Workarounds
Check that you are not using sensitive variables in module sources and versions, as well as backend configurations. The patch will add explicit errors and prevent this from being possible.
Examples
variable "backend_path" {
type = string
sensitive = true
}
terraform {
backend "local" {
path = var.backend_path
}
}
variable "mod_info" {
type = string
sensitive = true
}
module "foo" {
source = var.mod_info
//version = var.mod_info
}
Permalink: https://github.com/advisories/GHSA-wpr2-j6gr-pjw9JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS13cHIyLWo2Z3ItcGp3Oc4AA_7y
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: about 2 months ago
Updated: about 1 month ago
CVSS Score: 3.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Identifiers: GHSA-wpr2-j6gr-pjw9
References:
- https://github.com/opentofu/opentofu/security/advisories/GHSA-wpr2-j6gr-pjw9
- https://pkg.go.dev/vuln/GO-2024-3182
- https://github.com/advisories/GHSA-wpr2-j6gr-pjw9
Blast Radius: 1.0
Affected Packages
go:github.com/opentofu/opentofu
Dependent packages: 0Dependent repositories: 0
Downloads:
Affected Version Ranges: >= 1.8.0, < 1.8.3
Fixed in: 1.8.3
All affected versions: 1.8.0, 1.8.1, 1.8.2
All unaffected versions: 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.8.3, 1.8.4, 1.8.5