CVE-2021-3684:
OpenShift Assisted Installer leaks image pull secrets as plaintext in installation logs
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.12749%
CWE
Published
3/24/2023
Updated
4/4/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/openshift/assisted-installer | go | < 1.0.25.1 | 1.0.25.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two primary issues:
- The ExecCommandError's Error() and DetailedError() methods in ops.go logged command arguments and environment variables containing the PullSecretToken without sanitization. The patch introduced a 'removePullSecret' function to redact this sensitive data, confirming these functions were leaking secrets.
- The ops.ExtractFromIgnition function had a log message explicitly mentioning 'pull secret', which was modified to a generic 'data' reference. While this change reduces information disclosure, the higher-confidence leak occurred in command execution logging. The ControllerConfig struct modification (adding 'secret:"true"') suggests framework-level protections, but the direct logging in command execution paths was the root cause.