blob: 874f28f3eaa87b3128bf1804b48fac8f5bc3793a [file] [log] [blame]
id: GO-2024-2870
modules:
- module: github.com/aquasecurity/trivy
versions:
- fixed: 0.51.2
vulnerable_at: 0.51.1
packages:
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/azure
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/ecr
symbols:
- ECR.CheckOptions
- package: github.com/aquasecurity/trivy/pkg/fanal/image/registry/google
symbols:
- Registry.CheckOptions
summary: Credential leakage in github.com/aquasecurity/trivy
description: |-
A malicious registry can cause Trivy to leak credentials for legitimate
registries such as AWS Elastic Container Registry (ECR), Google Cloud
Artifact/Container Registry, or Azure Container Registry (ACR) if the registry
is scanned from directly using Trivy. These tokens can then be used to push/pull
images from those registries to which the identity/user running Trivy has
access. This vulnerability only applies when scanning container images directly
from a registry. If you use Docker, containerd or other runtime to pull images
locally and scan them with Trivy, you are not affected. To enforce this
behavior, you can use the --image-src flag to select which sources you trust.
cves:
- CVE-2024-35192
ghsas:
- GHSA-xcq4-m2r3-cmrj
credits:
- '@lyoung-confluent'
references:
- advisory: https://github.com/aquasecurity/trivy/security/advisories/GHSA-xcq4-m2r3-cmrj
- fix: https://github.com/aquasecurity/trivy/commit/e7f14f729de259551203f313e57d2d9d3aa2ff87
source:
id: GHSA-xcq4-m2r3-cmrj
created: 2024-05-22T14:41:45.135631743Z
review_status: REVIEWED