Sign your artifacts, source code or container images using Sigstore tools, Save the Signatures you want to use, and Validate & Control the deployments to allow only the known Sources based on Signatures, Maintainers & other payloads automatically.
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
CVE-2020-16251 - High Severity Vulnerability
Vulnerable Library - github.com/hashicorp/vault/api-v1.1.1
A tool for secrets management, encryption as a service, and privileged access management
Dependency Hierarchy: - github.com/sigstore/sigstore-v1.0.0 (Root Library) - :x: **github.com/hashicorp/vault/api-v1.1.1** (Vulnerable Library)
Found in HEAD commit: df1f7d3f67826e841793324e4796be4fbd91c00f
Found in base branch: main
Vulnerability Details
HashiCorp Vault and Vault Enterprise versions 0.8.3 and newer, when configured with the GCP GCE auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1.
Publish Date: 2020-08-26
URL: CVE-2020-16251
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-16251
Release Date: 2020-08-01
Fix Resolution: v1.2.5,v1.3.8,v1.4.4,v1.5.1
Step up your Open Source Security Game with Mend here