Page 2 of 8 results (0.005 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Minder by Stacklok is an open source software supply chain security platform. A refactoring in commit `5c381cf` added the ability to get GitHub repositories registered to a project without specifying a specific provider. Unfortunately, the SQL query for doing so was missing parenthesis, and would select a random repository. This issue is patched in pull request 2941. As a workaround, revert prior to `5c381cf`, or roll forward past `2eb94e7`. • https://github.com/stacklok/minder/commit/11b6573ad62cfdd783a8bb52f3fce461466037f4 https://github.com/stacklok/minder/commit/5c381cfbf3e4b7ce040ed8511a1fae1a78a0014b https://github.com/stacklok/minder/pull/2941 https://github.com/stacklok/minder/security/advisories/GHSA-ggp5-28x4-xcj9 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Minder is a software supply chain security platform. Prior to version 0.0.33, a Minder user can use the endpoints `GetRepositoryByName`, `DeleteRepositoryByName`, and `GetArtifactByName` to access any repository in the database, irrespective of who owns the repo and any permissions present. The database query checks by repo owner, repo name and provider name (which is always `github`). These query values are not distinct for the particular user - as long as the user has valid credentials and a provider, they can set the repo owner/name to any value they want and the server will return information on this repo. Version 0.0.33 contains a patch for this issue. • https://github.com/stacklok/minder/blob/a115c8524fbd582b2b277eaadce024bebbded508/internal/controlplane/handlers_repositories.go#L277-L278 https://github.com/stacklok/minder/blob/main/internal/controlplane/handlers_repositories.go#L257-L299 https://github.com/stacklok/minder/commit/45750b4e9fb2de33365758366e06c19e999bd2eb https://github.com/stacklok/minder/security/advisories/GHSA-v627-69v2-xx37 • CWE-285: Improper Authorization •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Minder is a Software Supply Chain Security Platform. In version 0.0.31 and earlier, it is possible for an attacker to register a repository with a invalid or differing upstream ID, which causes Minder to report the repository as registered, but not remediate any future changes which conflict with policy (because the webhooks for the repo do not match any known repository in the database). When attempting to register a repo with a different repo ID, the registered provider must have admin on the named repo, or a 404 error will result. Similarly, if the stored provider token does not have repo access, then the remediations will not apply successfully. Lastly, it appears that reconciliation actions do not execute against repos with this type of mismatch. • https://github.com/stacklok/minder/commit/53868a878e93f29c43437f96dbc990b548e48d1d https://github.com/stacklok/minder/security/advisories/GHSA-q6h8-4j2v-pjg4 • CWE-20: Improper Input Validation •