CVE-2023-3462

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-3462
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3462.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-3462
Aliases
Related
Withdrawn
2024-05-08T06:52:09.930516Z
Published
2023-07-31T23:15:10Z
Modified
2024-09-11T06:12:53.842949Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.

References

Affected packages

Git / github.com/hashicorp/vault

Affected ranges

Type
GIT
Repo
https://github.com/hashicorp/vault
Events

Affected versions

v1.*

v1.13.0
v1.13.1
v1.13.2
v1.13.3
v1.13.4