Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3879

Опубликовано: 02 мая 2025
Источник: redhat
CVSS3: 6.6

Описание

Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18.

A flaw was found in the Hashicorp Vault component. Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. The user-provided vm_name or vmss_name login parameters were not validated against the Azure-issued token claims. Setting a vm_name or vmss_name that would satisfy the login requirements could be used to bypass the bound_location restriction. The Azure auth method will now require the user-provided resource_group_name, vm_name, vmss_name parameters to match the Azure AD token claims on login. More information can be found at: https://developer.hashicorp.com/vault/docs/auth/azure#token-validation

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Openshift Data Foundation 4odf4/cephcsi-rhel9Fix deferred
Red Hat Openshift Data Foundation 4odf4/mcg-cli-rhel9Fix deferred
Red Hat Openshift Data Foundation 4odf4/mcg-rhel9-operatorFix deferred
Red Hat Openshift Data Foundation 4odf4/odf-cli-rhel9Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=2363797vault: Vault’s Azure Authentication Method bound_location Restriction Could be Bypassed on Login

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.6
nvd
11 месяцев назад

Vault Community, Vault Enterprise (“Vault”) Azure Auth method did not correctly validate the claims in the Azure-issued token, resulting in the potential bypass of the bound_locations parameter on login. Fixed in Vault Community Edition 1.19.1 and Vault Enterprise 1.19.1, 1.18.7, 1.17.14, 1.16.18.

CVSS3: 6.6
github
11 месяцев назад

Hashicorp Vault Community vulnerable to Incorrect Authorization

CVSS3: 6.6
fstec
11 месяцев назад

Уязвимость компонента Azure Auth платформы для архивирования корпоративной информации Vault Enterprise, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 6.6
redos
9 месяцев назад

Уязвимость vault

6.6 Medium

CVSS3