Bug 2189529 (CVE-2021-3024) - CVE-2021-3024 vault: API Endpoint Exposed Internal IP Address Without Authentication
Summary: CVE-2021-3024 vault: API Endpoint Exposed Internal IP Address Without Authent...
Keywords:
Status: NEW
Alias: CVE-2021-3024
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2223671
Blocks: 2223663
TreeView+ depends on / blocked
 
Reported: 2023-04-25 14:07 UTC by Pedro Sampaio
Modified: 2023-08-03 08:29 UTC (History)
5 users (show)

Fixed In Version: vault 1.6.2, vault 1.5.7
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in HashiCorp Vault and Vault Enterprise. This flaw allows a remote attacker to obtain sensitive information caused by a vulnerability in the Vault API. By sending a specially-crafted request, a remote attacker can obtain the internal IP address of the Vault node.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Pedro Sampaio 2023-04-25 14:07:16 UTC
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests. Fixed in 1.6.2 & 1.5.7.

References:

https://discuss.hashicorp.com/t/hcsec-2021-02-vault-api-endpoint-exposed-internal-ip-address-without-authentication/20334
https://security.gentoo.org/glsa/202207-01


Note You need to log in before you can comment on or make changes to this bug.