{ "schema_version": "1.4.0", "id": "GHSA-qg93-hr7r-24gf", "modified": "2022-05-24T19:14:23Z", "published": "2022-05-24T19:14:23Z", "aliases": [ "CVE-2021-41077" ], "details": "The activation process in Travis CI, for certain 2021-09-03 through 2021-09-10 builds, causes secret data to have unexpected sharing that is not specified by the customer-controlled .travis.yml file. In particular, the desired behavior (if .travis.yml has been created locally by a customer, and added to git) is for a Travis service to perform builds in a way that prevents public access to customer-specific secret environment data such as signing keys, access credentials, and API tokens. However, during the stated 8-day interval, secret data could be revealed to an unauthorized actor who forked a public repository and printed files during a build process.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41077" }, { "type": "WEB", "url": "https://blog.travis-ci.com/2021-09-13-bulletin" }, { "type": "WEB", "url": "https://news.ycombinator.com/item?id=28523350" }, { "type": "WEB", "url": "https://news.ycombinator.com/item?id=28524727" }, { "type": "WEB", "url": "https://travis-ci.community/t/security-bulletin/12081" }, { "type": "WEB", "url": "https://twitter.com/peter_szilagyi/status/1437646118700175360" }, { "type": "WEB", "url": "https://twitter.com/peter_szilagyi/status/1437649838477283330" } ], "database_specific": { "cwe_ids": [ "CWE-862" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-09-14T16:15:00Z" } }