CVE-2022-24912:
Atlantis Events vulnerable to Timing Attack
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.44725%
CWE
Published
7/30/2022
Updated
8/30/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/runatlantis/atlantis | go | < 0.19.7 | 0.19.7 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability was specifically patched by replacing a direct string comparison with crypto/subtle.ConstantTimeCompare
in the ParseAndValidate
method of the GitLab validator. The pre-patch code compared secrets using regular string equality checks (headerSecret != secretStr
), which leaks timing information. This function is explicitly shown in the commit diff and referenced in all vulnerability reports as the attack vector. Other webhook validators (GitHub/Bitbucket
) were not vulnerable as they used HMAC
validation instead of direct secret comparison.