kube-tarian / sigrun

Sign your artifacts, source code or container images using Sigstore tools, Save the Signatures you want to use, and Validate & Control the deployments to allow only the known Sources based on Signatures, Maintainers & other payloads automatically.
https://sigrun.dev
Apache License 2.0
12 stars 3 forks source link

CVE-2020-16251 (High) detected in github.com/hashicorp/vault/api-v1.1.1 #120

Closed mend-bolt-for-github[bot] closed 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2020-16251 - High Severity Vulnerability

Vulnerable Library - github.com/hashicorp/vault/api-v1.1.1

A tool for secrets management, encryption as a service, and privileged access management

Dependency Hierarchy: - github.com/sigstore/sigstore-v1.0.0 (Root Library) - :x: **github.com/hashicorp/vault/api-v1.1.1** (Vulnerable Library)

Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f

Found in base branch: main

Vulnerability Details

HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.

Publish Date: 2020-08-26

URL: CVE-2020-16251

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-16251

Release Date: 2020-08-01

Fix Resolution: v1.2.5,v1.3.8,v1.4.4,v1.5.1


Step up your Open Source Security Game with Mend here

github-actions[bot] commented 2 years ago

Stale issue message