Bug 1968032 (CVE-2021-32923)

Summary: CVE-2021-32923 vault: Token leases incorrectly treated as non-expiring
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: amctagga, etamir, gghezzo, gparvin, hchiramm, jarrpa, jburrell, jcantril, jweiser, jwendell, madam, muagarwa, nbecker, rcernich, sostapov, stcannon, thee, tnielsen, twalsh
Target Milestone: ---Keywords: Reopened, Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: vault 1.5.9, vault 1.6.5, vault 1.7.2 Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the HashiCorp Vault and Vault Enterprise. The vault could allow a remote attacker to bypass security restrictions caused by a renewal logic flaw when a token lease or dynamic secret lease was renewed inside the last second of its maximum TTL. By sending a specially crafted request, an attacker can bypass authentication validation and gain access to the system.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-28 18:13:39 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1969939, 2170357, 2170358, 2170359    
Bug Blocks: 1968033    

Description Pedro Sampaio 2021-06-04 18:18:40 UTC
HashiCorp Vault and Vault Enterprise allowed the renewal of nearly-expired token leases and dynamic secret leases (specifically, those within 1 second of their maximum TTL), which caused them to be incorrectly treated as non-expiring during subsequent use. Fixed in 1.5.9, 1.6.5, and 1.7.2.

References:

https://www.hashicorp.com/blog/category/vault/
https://discuss.hashicorp.com/t/hcsec-2021-15-vault-renewed-nearly-expired-leases-with-incorrect-non-expiring-ttls/24603