GHSA-9v3w-w2jh-4hff

Suggest an improvement
Source
https://github.com/advisories/GHSA-9v3w-w2jh-4hff
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/08/GHSA-9v3w-w2jh-4hff/GHSA-9v3w-w2jh-4hff.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9v3w-w2jh-4hff
Aliases
Related
Published
2023-08-01T00:30:17Z
Modified
2024-09-11T06:12:53.842949Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
HashiCorp Vault and Vault Enterprise vulnerable to user enumeration
Details

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.

Database specific
{
    "nvd_published_at": "2023-07-31T23:15:10Z",
    "cwe_ids": [
        "CWE-203"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-01T16:58:49Z"
}
References

Affected packages

Go / github.com/hashicorp/vault

Package

Name
github.com/hashicorp/vault
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/vault

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.13.5

Go / github.com/hashicorp/vault

Package

Name
github.com/hashicorp/vault
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/vault

Affected ranges

Type
SEMVER
Events
Introduced
1.14.0
Fixed
1.14.1

Affected versions

1.*

1.14.0