Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j3xv-7fxp-gfhx

Опубликовано: 08 авг. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5.3

Описание

OpenBao Userpass and LDAP User Lockout Bypass

Impact

Attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions.

Patches

OpenBao v2.3.2 will patch this issue.

Workarounds

Existing users may apply rate-limiting quotas on the authentication endpoints: https://openbao.org/api-docs/system/rate-limit-quotas/

References

This issue was disclosed to HashiCorp and is the OpenBao equivalent of the following tickets:

Пакеты

Наименование

github.com/openbao/openbao

go
Затронутые версииВерсия исправления

>= 0.1.0, < 2.3.2

2.3.2

Наименование

github.com/openbao/openbao

go
Затронутые версииВерсия исправления

< 0.0.0-20250807212521-c52795c1ef74

0.0.0-20250807212521-c52795c1ef74

EPSS

Процентиль: 8%
0.00034
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-307

Связанные уязвимости

CVSS3: 5.3
nvd
около 1 месяца назад

OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/.

CVSS3: 5.3
debian
около 1 месяца назад

OpenBao exists to provide a software solution to manage, store, and di ...

EPSS

Процентиль: 8%
0.00034
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-307