Lucene search

K
cvelistHashiCorpCVELIST:CVE-2024-8365
HistorySep 02, 2024 - 1:30 a.m.

CVE-2024-8365 Vault Leaks AppRole Client Tokens And Accessor in Audit Log

2024-09-0201:30:56
CWE-532
HashiCorp
www.cve.org
8
vault community edition
vault enterprise
regression
plaitext tokens
accessors
audit log
vulnerability
cve-2024-8365

CVSS3

6.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

37.7%

Vault Community Edition and Vault Enterprise experienced a regression where functionality that HMAC’d sensitive headers in the configured audit device, specifically client tokens and token accessors, was removed. This resulted in the plaintext values of client tokens and token accessors being stored in the audit log. This vulnerability, CVE-2024-8365, was fixed in Vault Community Edition and Vault Enterprise 1.17.5 and Vault Enterprise 1.16.9.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "64 bit",
      "32 bit",
      "x86",
      "ARM",
      "MacOS",
      "Windows",
      "Linux"
    ],
    "product": "Vault",
    "repo": "https://github.com/hashicorp/vault",
    "vendor": "HashiCorp",
    "versions": [
      {
        "lessThan": "1.17.5",
        "status": "affected",
        "version": "1.17.3",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "64 bit",
      "32 bit",
      "x86",
      "ARM",
      "MacOS",
      "Windows",
      "Linux"
    ],
    "product": "Vault Enterprise",
    "repo": "https://github.com/hashicorp/vault",
    "vendor": "HashiCorp",
    "versions": [
      {
        "changes": [
          {
            "at": "1.16.9",
            "status": "unaffected"
          },
          {
            "at": "1.17.3",
            "status": "unaffected"
          }
        ],
        "lessThan": "1.17.5",
        "status": "affected",
        "version": "1.16.7",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

6.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N

EPSS

0.001

Percentile

37.7%

Related for CVELIST:CVE-2024-8365