Miggo Logo

GHSA-vxg3-w9rv-rhr2: Contrast leaks workload secrets to logs on INFO level

7.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
8/28/2025
Updated
8/28/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/edgelesssys/contrastgo>= 1.9.0, <= 1.12.11.12.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is a classic case of CWE-532, Insertion of Sensitive Information into Log File. The analysis of the provided patches confirms that the run function in initializer/main.go was logging a variable resp that contained sensitive workload secrets. The patch removes this logging statement and replaces it with a generic message, thus mitigating the vulnerability. The function main.run is the direct source of the information leak and would appear in a runtime profile when the vulnerable code is executed. The vulnerability was a regression, meaning a previous fix was not correctly ported, and the provided commits re-apply the necessary changes to prevent the secret leakage.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T*is is t** s*m* vuln*r**ility *s *ttps://*it*u*.*om/****l*sssys/*ontr*st/s**urity/**visori*s/**S*-****-*rrq-*pw*. T** ori*in*l vuln*r**ility *** ***n *ix** *or r*l**s* `v*.*.*`, *ut t** *ix w*s not port** to t** m*in *r*n** *n* t*us not pr*s*nt in r

Reasoning

T** vuln*r**ility is * *l*ssi* **s* o* *W*-***, Ins*rtion o* S*nsitiv* In*orm*tion into Lo* *il*. T** *n*lysis o* t** provi*** p*t***s *on*irms t**t t** `run` *un*tion in `initi*liz*r/m*in.*o` w*s lo**in* * v*ri**l* `r*sp` t**t *ont*in** s*nsitiv* wo