logo

Database

Sensitive information stored in logs In github.com/coder/coder/v2

Ecosystem
Package
Affected version
Patched versions

Description

Coder logs sensitive objects unsanitized

Summary

Workspace Agent manifests containing sensitive values were logged in plaintext unsanitized

Details

By default Workspace Agent logs are redirected to stderr https://github.com/coder/coder/blob/a8862be546f347c59201e2219d917e28121c0edb/cli/agent.go#L432-L439

Workspace Agent Manifests containing sensitive environment variables were logged insecurely https://github.com/coder/coder/blob/7beb95fd56d2f790502e236b64906f8eefb969bd/agent/agent.go#L1090

An attacker with limited local access to the Coder Workspace (VM, K8s Pod etc.) or a third-party system (SIEM, logging stack) could access those logs

This behavior opened room for unauthorized access and privilege escalation

Impact

Impact varies depending on the environment variables set in a given workspace

Patches

Fix was released & backported:

Workarounds

One potential workaround is to disable Workspace Agent Logs by setting following configuration option CODER_AGENT_LOGGING_HUMAN=/dev/null

platform operators are advised to upgrade their deployments

Mitigation

go github.com/coder/coder/v2: Upgrade to version(s) 2.26.5, 2.27.7, 2.28.4 or higher.

Severity v4.0

5.6

Medium

Fluid Attacks ID

FLAT-H7WC2

CWE ID(s)

CWE-532

Alternative ID

GHSA-jf75-p25m-pw74

EPSS

N/A

Percentile

N/A

Source

GitHub Advisory Database

Does your application use this vulnerable software?

During the free trial, our tools assess your application, identify vulnerabilities, and provide recommendations for their remediation.