Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Save terraform sensitive values as Octopus sensitive values (CVE-2019-8944) #5315

Closed
mcasperson opened this issue Feb 19, 2019 · 2 comments
Closed
Assignees
Milestone

Comments

@mcasperson
Copy link

Sensitive Terraform output variables are saved and exposed as regular variables, and printed in the logs.

For example, if you deploy the following Terraform template:

{"output":{"test":{"sensitive": true, "value": "hi"}}}

The value hi would appear in the logs.

@mcasperson mcasperson self-assigned this Feb 19, 2019
@mcasperson
Copy link
Author

Sensitive variables are now masked in the logs and saved as Octopus sensitive variables.

@mcasperson mcasperson added this to the 2019.1.8 milestone Feb 19, 2019
@mcasperson mcasperson changed the title Save terraform sensitive values as Octopus sensitive values Save terraform sensitive values as Octopus sensitive values (CVE-2019-8944) Feb 20, 2019
@lock
Copy link

lock bot commented May 21, 2019

This thread has been automatically locked since there has not been any recent activity after it was closed. If you think you've found a related issue, please contact our support team so we can triage your issue, and make sure it's handled appropriately.

@lock lock bot locked as resolved and limited conversation to collaborators May 21, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant