Lucene search

K
githubGitHub Advisory DatabaseGHSA-VH73-Q3RW-QX7W
HistoryFeb 05, 2024 - 9:30 p.m.

Boundary vulnerable to session hijacking through TLS certificate tampering

2024-02-0521:30:31
CWE-295
GitHub Advisory Database
github.com
4
boundary enterprise
session hijacking
tls certificate
tampering
attacker privileges
private key
trust on first use
tofu token
active session
underlying service
application
software

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.3%

Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.

Affected configurations

Vulners
Node
hashicorpboundaryRange<0.15.0
CPENameOperatorVersion
github.com/hashicorp/boundarylt0.15.0

8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

7 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

19.3%