Описание
OpenBao LDAP MFA Enforcement Bypass When Using Username As Alias
Impact
OpenBao allows assignment of policies and MFA attribution based upon entity aliases, chosen by the underlying auth method. When using the username_as_alias=true
parameter in the LDAP auth method, the caller-supplied username is used verbatim without normalization, allowing an attacker to bypass alias-specific MFA requirements.
Patches
OpenBao v2.3.2 will patch this issue.
Workarounds
LDAP methods are only vulnerable if using username_as_alias=true
. Remove all usage of this parameter and update any entity aliases accordingly.
References
This issue was disclosed to HashiCorp and is the OpenBao equivalent of the following tickets:
Ссылки
- https://github.com/openbao/openbao/security/advisories/GHSA-2q8q-8fgw-9p6p
- https://nvd.nist.gov/vuln/detail/CVE-2025-55001
- https://nvd.nist.gov/vuln/detail/CVE-2025-6013
- https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc
- https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092
Пакеты
github.com/openbao/openbao
>= 0.1.0, < 2.3.2
2.3.2
github.com/openbao/openbao
< 0.0.0-20250807212521-c52795c1ef74
0.0.0-20250807212521-c52795c1ef74
Связанные уязвимости
OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao allowed the assignment of policies and MFA attribution based upon entity aliases, chosen by the underlying auth method. When the username_as_alias=true parameter in the LDAP auth method was in use, the caller-supplied username was used verbatim without normalization, allowing an attacker to bypass alias-specific MFA requirements. This issue was fixed in version 2.3.2. To work around this, remove all usage of the username_as_alias=true parameter and update any entity aliases accordingly.
OpenBao exists to provide a software solution to manage, store, and di ...