Skip to content

Sensitive Information Exposure Through Insecure Logging For Secrets Like Metadata.DockerBuildArgs

High
hnnasit published GHSA-rjc6-vm4h-85cg Sep 11, 2024

Package

AWS SAM CLI

Affected versions

aws-sam-cli<1.122.0

Patched versions

1.122.0

Description

Summary

The AWS Serverless Application Model (SAM) CLI is an open source tool that allows customers to build, deploy and test their serverless applications built on AWS. AWS SAM CLI can build container (Docker) images and customers can specify arguments in the SAM template that are passed to the Docker engine during build [1].

Impact

If customers specify sensitive data in the DockerBuildArgs parameter of their template, the sensitive data will be shown in clear text in the AWS SAM CLI output via STDERR when running the sam build command.

Patches

A patch is included in aws-sam-cli>=1.122.0.

We strongly recommend customers install AWS SAM CLI v1.122.0 or above. Please review logs produced by your SAM CLI runs if you have used the DockerBuildArgs parameter and consider rotating the secrets if you believe they were exposed.

References

If you have any questions or comments about this issue, we ask that you contact AWS/Amazon Security via our vulnerability reporting page [2] or directly via email to aws-security@amazon.com. Please do not create a public GitHub issue.

[1] https://docs.aws.amazon.com/serverless-application-model/latest/developerguide/serverless-sam-cli-using-build.html#build-container-image

[2] https://aws.amazon.com/security/vulnerability-reporting

Severity

High

CVE ID

No known CVE

Weaknesses

No CWEs