Miggo Logo

CVE-2024-41129: ops leaking secrets if `subprocess.CalledProcessError` happens with a `secret-*` CLI command

4.4

CVSS Score
3.1

Basic Information

EPSS Score
0.07996%
Published
7/22/2024
Updated
8/1/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
opspip>= 2.0.0, < 2.15.02.15.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from passing secrets as CLI arguments in Juju operations. The commit diff shows these functions were modified to use temp files instead of command-line args for secret values. Previously, they used 'k=v' argument formatting (visible in pre-patch code) which would be captured in CalledProcessError exceptions and logged. The CVE description explicitly references these secret-* CLI commands being logged with sensitive data, and the patch changes these specific functions' secret handling mechanism.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry T** issu* **r* is t**t w* p*ss t** s**r*t *ont*nt *s on* o* t** *r*s vi* *LI. T*is issu* m*y *****t *ny o* our ***rms t**t *r* usin*: Juju (>=*.*), Juju s**r*ts *n* not *orr**tly **pturin* *n* pro**ssin* `su*pro**ss.**ll**Pro**ss*rror`.

Reasoning

T** vuln*r**ility st*ms *rom p*ssin* s**r*ts *s *LI *r*um*nts in Juju op*r*tions. T** *ommit *i** s*ows t**s* *un*tions w*r* mo*i*i** to us* t*mp *il*s inst*** o* *omm*n*-lin* *r*s *or s**r*t v*lu*s. Pr*viously, t**y us** 'k=v' *r*um*nt *orm*ttin* (v