BIT-vault-2023-3462

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/vault/BIT-vault-2023-3462.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-vault-2023-3462
Aliases
Published
2024-03-06T11:08:58.668Z
Modified
2024-09-11T06:12:53.842949Z
Summary
[none]
Details

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.

Database specific
{
    "cpes": [
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
        "cpe:2.3:a:hashicorp:vault:1.14.0:*:*:*:-:*:*:*",
        "cpe:2.3:a:hashicorp:vault:1.14.0:*:*:*:enterprise:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / vault

Package

Name
vault
Purl
pkg:bitnami/vault

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
1.13.0
Fixed
1.13.5
Type
SEMVER
Events
Introduced
1.14.0
Last affected
1.14.0