Lucene search

K
githubGitHub Advisory DatabaseGHSA-WMG5-G953-QQFW
HistoryJul 06, 2023 - 7:24 p.m.

Hashicorp Vault Fails to Verify if Approle SecretID Belongs to Role During a Destroy Operation

2023-07-0619:24:11
GitHub Advisory Database
github.com
120
vault
approle
vulnerability
fixed
versions

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

43.8%

When using the Vault and Vault Enterprise (Vault) approle auth method, any authenticated user with access to the /auth/approle/role/:role_name/secret-id-accessor/destroy endpoint can destroy the secret ID of any other role by providing the secret ID accessor. This vulnerability, CVE-2023-24999, has been fixed in Vault 1.13.0, 1.12.4, 1.11.8, 1.10.11 and above.

Affected configurations

Vulners
Node
hashicorpvaultRange<1.12.4
OR
hashicorpvaultRange<1.11.8
OR
hashicorpvaultRange<1.10.11

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

0.001 Low

EPSS

Percentile

43.8%