Описание
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.
A flaw was found in Hashicorp Vault. Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Openshift Container Storage 4 | ocs4/cephcsi-rhel8 | Not affected | ||
Red Hat Openshift Container Storage 4 | ocs4/mcg-rhel8-operator | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/ocs-must-gather-rhel8 | Not affected | ||
Red Hat Openshift Container Storage 4 | ocs4/ocs-rhel8-operator | Affected | ||
Red Hat Openshift Container Storage 4 | ocs4/rook-ceph-rhel8-operator | Affected | ||
Red Hat Openshift Data Foundation 4 | odf4/cephcsi-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/mcg-cli-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/mcg-rhel9-operator | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/ocs-metrics-exporter-rhel9 | Not affected | ||
Red Hat Openshift Data Foundation 4 | odf4/ocs-must-gather-rhel8 | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
Vault’s SSH secrets engine did not require the valid_principals list to contain a value by default. If the valid_principals and default_user fields of the SSH secrets engine configuration are not set, an SSH certificate requested by an authorized user to Vault’s SSH secrets engine could be used to authenticate as any user on the host. Fixed in Vault Community Edition 1.17.6, and in Vault Enterprise 1.17.6, 1.16.10, and 1.15.15.
Vault SSH Secrets Engine Configuration Did Not Restrict Valid Principals By Default
Уязвимость платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, связанная с неправильным назначением разрешений для критического ресурса, позволяющая нарушителю обойти процесс аутентификации
EPSS
7.5 High
CVSS3