{"id":"CVE-2024-31216","summary":"source-controller leaks theAzure Storage SAS token into logs on connection errors","details":"The source-controller is a Kubernetes operator, specialised in artifacts acquisition from external sources such as Git, OCI, Helm repositories and S3-compatible buckets. The source-controller implements the source.toolkit.fluxcd.io API and is a core component of the GitOps toolkit. Prior to version 1.2.5, when source-controller was configured to use an Azure SAS token when connecting to Azure Blob Storage, the token was logged along with the Azure URL when the controller encountered a connection error. An attacker with access to the source-controller logs could use the token to gain access to the Azure Blob Storage until the token expires. This vulnerability was fixed in source-controller v1.2.5. There is no workaround for this vulnerability except for using a different auth mechanism such as Azure Workload Identity.","aliases":["GHSA-v554-xwgw-hc3w","GO-2024-2859"],"modified":"2026-04-10T05:13:00.610111Z","published":"2024-05-15T15:52:15.084Z","related":["CGA-98j2-g5j5-52xg"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/31xxx/CVE-2024-31216.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-532"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/31xxx/CVE-2024-31216.json"},{"type":"ADVISORY","url":"https://github.com/fluxcd/source-controller/security/advisories/GHSA-v554-xwgw-hc3w"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31216"},{"type":"FIX","url":"https://github.com/fluxcd/source-controller/commit/915d1a072a4f37dd460ba33079dc094aa6e72fa9"},{"type":"FIX","url":"https://github.com/fluxcd/source-controller/pull/1430"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/fluxcd/source-controller","events":[{"introduced":"0"},{"fixed":"915d1a072a4f37dd460ba33079dc094aa6e72fa9"}]},{"type":"GIT","repo":"https://github.com/fluxcd/source-controller","events":[{"introduced":"0"},{"fixed":"915d1a072a4f37dd460ba33079dc094aa6e72fa9"}]}],"versions":["api/v0.0.10","api/v0.0.11","api/v0.0.12","api/v0.0.13","api/v0.0.14","api/v0.0.15","api/v0.0.16","api/v0.0.17","api/v0.0.18","api/v0.0.9","api/v0.1.0","api/v0.1.1","api/v0.10.0","api/v0.11.0","api/v0.12.0","api/v0.12.1","api/v0.12.2","api/v0.13.0","api/v0.13.1","api/v0.13.2","api/v0.14.0","api/v0.15.0","api/v0.15.1","api/v0.15.2","api/v0.15.3","api/v0.15.4","api/v0.16.0","api/v0.16.1","api/v0.17.0","api/v0.17.1","api/v0.17.2","api/v0.18.0","api/v0.19.0","api/v0.19.1","api/v0.19.2","api/v0.2.0","api/v0.2.1","api/v0.2.2","api/v0.2.3","api/v0.20.0","api/v0.20.1","api/v0.21.0","api/v0.21.1","api/v0.21.2","api/v0.22.0","api/v0.22.1","api/v0.22.2","api/v0.22.3","api/v0.22.4","api/v0.22.5","api/v0.24.0","api/v0.24.1","api/v0.24.2","api/v0.24.3","api/v0.24.4","api/v0.25.0","api/v0.25.1","api/v0.25.2","api/v0.25.3","api/v0.25.4","api/v0.25.5","api/v0.25.6","api/v0.25.7","api/v0.25.8","api/v0.25.9","api/v0.26.0","api/v0.26.1","api/v0.27.0","api/v0.28.0","api/v0.29.0","api/v0.3.0","api/v0.30.0","api/v0.30.1","api/v0.31.0","api/v0.32.0","api/v0.32.1","api/v0.33.0","api/v0.34.0","api/v0.35.0","api/v0.35.1","api/v0.35.2","api/v0.36.0","api/v0.36.1","api/v0.4.0","api/v0.4.1","api/v0.5.0","api/v0.5.1","api/v0.5.2","api/v0.5.3","api/v0.5.4","api/v0.5.5","api/v0.5.6","api/v0.6.0","api/v0.6.1","api/v0.6.2","api/v0.6.3","api/v0.7.0","api/v0.7.1","api/v0.7.2","api/v0.7.3","api/v0.7.4","api/v0.8.0","api/v0.8.1","api/v0.9.0","api/v0.9.1","api/v1.0.0-rc.1","api/v1.0.0-rc.2","api/v1.0.0-rc.3","api/v1.0.0-rc.4","api/v1.0.0-rc.5","v0.0.1","v0.0.1-alpha.1","v0.0.1-alpha.2","v0.0.1-alpha.3","v0.0.1-alpha.4","v0.0.1-alpha.5","v0.0.1-alpha.6","v0.0.1-beta.1","v0.0.1-beta.2","v0.0.10","v0.0.12","v0.0.13","v0.0.14","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.2","v0.0.3","v0.0.4","v0.0.5","v0.0.6","v0.0.7","v0.0.8","v0.0.9","v0.1.0","v0.1.1","v0.10.0","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.13.0","v0.13.1","v0.13.2","v0.14.0","v0.15.0","v0.15.1","v0.15.2","v0.15.3","v0.15.4","v0.16.0","v0.16.1","v0.17.0","v0.17.1","v0.17.2","v0.18.0","v0.19.0","v0.19.1","v0.19.2","v0.2.0","v0.2.1","v0.2.2","v0.20.0","v0.20.1","v0.21.0","v0.21.1","v0.21.2","v0.22.0","v0.22.1","v0.22.2","v0.22.3","v0.22.4","v0.22.5","v0.23.0","v0.24.0","v0.24.1","v0.24.2","v0.24.3","v0.24.4","v0.25.0","v0.25.1","v0.25.2","v0.25.3","v0.25.4","v0.25.5","v0.25.6","v0.25.7","v0.25.8","v0.25.9","v0.26.0","v0.26.1","v0.27.0","v0.28.0","v0.29.0","v0.3.0","v0.30.0","v0.30.1","v0.31.0","v0.32.0","v0.32.1","v0.33.0","v0.34.0","v0.35.0","v0.35.1","v0.35.2","v0.36.0","v0.36.1","v0.4.0","v0.4.1","v0.5.0","v0.5.1","v0.5.2","v0.5.3","v0.5.4","v0.5.5","v0.5.6","v0.6.0","v0.6.1","v0.6.2","v0.6.3","v0.7.0","v0.7.1","v0.7.2","v0.7.3","v0.7.4","v0.8.0","v0.8.1","v0.9.0","v0.9.1","v1.0.0-rc.1","v1.0.0-rc.2","v1.0.0-rc.3","v1.0.0-rc.4","v1.0.0-rc.5"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-31216.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}