Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-54999

Опубликовано: 09 авг. 2025
Источник: debian
EPSS Низкий

Описание

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
openbaoitppackage

EPSS

Процентиль: 5%
0.00023
Низкий

Связанные уязвимости

CVSS3: 3.7
nvd
около 1 месяца назад

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/.

CVSS3: 3.7
github
около 1 месяца назад

OpenBao has a Timing Side-Channel in the Userpass Auth Method

EPSS

Процентиль: 5%
0.00023
Низкий