golang / vulndb

[mirror] The Go Vulnerability Database
Other
565 stars 61 forks source link

x/vulndb: potential Go vuln in github.com/hashicorp/vault: GHSA-jg74-mwgw-v6x3 #3162

Closed GoVulnBot closed 1 month ago

GoVulnBot commented 2 months ago

Advisory GHSA-jg74-mwgw-v6x3 references a vulnerability in the following Go modules:

Module
github.com/hashicorp/vault

Description: Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/hashicorp/vault
      versions:
        - introduced: 1.7.7
        - fixed: 1.17.6
      vulnerable_at: 1.17.5
summary: |-
    Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By
    Default in github.com/hashicorp/vault
cves:
    - CVE-2024-7594
ghsas:
    - GHSA-jg74-mwgw-v6x3
references:
    - advisory: https://github.com/advisories/GHSA-jg74-mwgw-v6x3
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-7594
    - web: https://discuss.hashicorp.com/t/hcsec-2024-20-vault-ssh-secrets-engine-configuration-did-not-restrict-valid-principals-by-default/70251
source:
    id: GHSA-jg74-mwgw-v6x3
    created: 2024-09-26T22:01:31.950244668Z
review_status: UNREVIEWED
gopherbot commented 1 month ago

Change https://go.dev/cl/619135 mentions this issue: data/reports: add 15 reports