Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54999

Опубликовано: 09 авг. 2025
Источник: debian

Описание

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openbaoitppackage

Связанные уязвимости

CVSS3: 3.7
nvd
5 месяцев назад

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/.

CVSS3: 3.7
github
5 месяцев назад

OpenBao has a Timing Side-Channel in the Userpass Auth Method

CVSS3: 5.3
fstec
5 месяцев назад

Уязвимость системы управления секретами и шифрованием OpenBao, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальной информации

CVSS3: 9.1
redos
4 месяца назад

Множественные уязвимости openbao