Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-7594

Опубликовано: 26 сент. 2024
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.

A flaw was found in Hashicorp Vault. Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Openshift Container Storage 4ocs4/cephcsi-rhel8Not affected
Red Hat Openshift Container Storage 4ocs4/mcg-rhel8-operatorAffected
Red Hat Openshift Container Storage 4ocs4/ocs-must-gather-rhel8Not affected
Red Hat Openshift Container Storage 4ocs4/ocs-rhel8-operatorAffected
Red Hat Openshift Container Storage 4ocs4/rook-ceph-rhel8-operatorAffected
Red Hat Openshift Data Foundation 4odf4/cephcsi-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/mcg-cli-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/mcg-rhel9-operatorNot affected
Red Hat Openshift Data Foundation 4odf4/ocs-metrics-exporter-rhel9Not affected
Red Hat Openshift Data Foundation 4odf4/ocs-must-gather-rhel8Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-732
https://bugzilla.redhat.com/show_bug.cgi?id=2315013hashicorp/vault: Vault SSH secrets engine configuration did not restrict valid principals by default

EPSS

Процентиль: 38%
0.00161
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
12 месяцев назад

Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.

CVSS3: 7.5
redos
3 месяца назад

Уязвимость vault

CVSS3: 7.5
github
12 месяцев назад

Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default

CVSS3: 7.5
fstec
12 месяцев назад

Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением разрешений для критического ресурса, позволяющая нарушителю обойти процесс аутентификации

suse-cvrf
10 месяцев назад

Security update for govulncheck-vulndb

EPSS

Процентиль: 38%
0.00161
Низкий

7.5 High

CVSS3