Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/edgelesssys/contrast
  4. ›
  5. GHSA-h5f8-crrq-4pw8

GHSA-h5f8-crrq-4pw8: Contrast workload secrets leak to logs on INFO level

May 28, 2025

When the Contrast initializer is configured with a CONTRAST_LOG_LEVEL of info or debug, the workload secret is logged to stderr and written to Kubernetes logs.

Since info is the default setting, this affects all Contrast installations that don’t customize their initializers’ log level.

The following audiences are intended to have access to workload secrets (see https://docs.edgeless.systems/contrast/1.7/architecture/secrets#workload-secrets):

  • Contrast Coordinator (can derive all workload secrets)
  • Contrast Initializer (obtains only the secret configured in the manifest)
  • Seedshare owner (can derive all workload secrets)
  • Workload owner (can update manifests to obtain secrets)

This vulnerability allows the following parties unintended access to workload secrets issued by a Coordinator:

  • Kubernetes users with get or list permission on pods/logs.
  • Others with read access to the Kubernetes log storage (most notably, the cloud provider).

This vulnerability does not affect scenarios where workload secrets are not used by the application (directly or with secure persistence). Applications designed for workload owner exclusion can’t use workload secrets and are thus unaffected.

References

  • github.com/advisories/GHSA-h5f8-crrq-4pw8
  • github.com/edgelesssys/contrast
  • github.com/edgelesssys/contrast/security/advisories/GHSA-h5f8-crrq-4pw8

Code Behaviors & Features

Detect and mitigate GHSA-h5f8-crrq-4pw8 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.8.1

Fixed versions

  • 1.8.1

Solution

Upgrade to version 1.8.1 or above.

Impact 7.3 HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-532: Insertion of Sensitive Information into Log File

Source file

go/github.com/edgelesssys/contrast/GHSA-h5f8-crrq-4pw8.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 19 Aug 2025 12:18:42 +0000.