Loading HuntDB...

GHSA-xh7v-965r-23f7

GitHub Security Advisory

Atlantis Exposes Service Version Publicly on /status API Endpoint

✓ GitHub Reviewed LOW Has CVE

Advisory Details

### Summary
Atlantis publicly exposes detailed version information on its `/status` endpoint. This information disclosure could allow attackers to identify and target known vulnerabilities associated with the specific versions, potentially compromising the service's security posture.

### Details
The `/status` endpoint in Atlantis returns not only a health check but also detailed version and build information. This disclosure violates the principle of minimizing exposed sensitive metadata and can be leveraged by adversaries to correlate the version information with public vulnerability databases, including CVE listings. Although Atlantis is a public repository maintained by an external team, reducing this exposure can lessen the overall risk of targeted attacks.

For example, the source code handling the `/status` endpoint exposes version details that allow one to infer software dependencies and system configurations. Best practices, including guidelines from the [OWASP Top 10](https://owasp.org/www-project-top-ten/) and recommendations discussed in NIST SP 800-53, advocate for restricting such potentially exploitable information.

### PoC
1. Issue a GET request to `http://<atlantis-host>/status` using a tool like `curl` or a web browser.
2. Note that the API response includes detailed version and build information.
3. Verify that no authentication is required to access the endpoint, leading to public exposure.
4. Cross-reference the disclosed version with public vulnerability databases (e.g., [NVD](https://nvd.nist.gov)) for likely vulnerabilities.

### Impact
The vulnerability falls under the category of information disclosure. Attackers could use the version details to scan public vulnerability repositories and tailor attacks based on known flaws in that particular version. This could potentially escalate into a broader compromise if the underlying software has exploitable vulnerabilities. Therefore, the affected parties include any users or administrators who rely on Atlantis, as well as the maintainers who are responsible for keeping the service secure.

### CVS Severity Assessment
Based on the current circumstances, this issue is assessed as **CVS Severity: LOW**. However, if the disclosed version is known to contain critical vulnerabilities, the severity rating could be re-evaluated to **Medium**. It is recommended to restrict this information to safeguarded internal channels to mitigate the risk of targeted attacks.

Affected Packages

Go github.com/runatlantis/atlantis
Affected versions: 0 (last affected: 0.35.1)

Related CVEs

Key Information

GHSA ID
GHSA-xh7v-965r-23f7
Published
September 5, 2025 9:18 PM
Last Modified
September 10, 2025 8:51 PM
CVSS Score
2.5 /10
Primary Ecosystem
Go
Primary Package
github.com/runatlantis/atlantis
GitHub Reviewed
✓ Yes

Dataset

Last updated: September 11, 2025 6:35 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.