BIT-vault-2023-0620

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/vault/BIT-vault-2023-0620.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-vault-2023-0620
Aliases
Published
2024-03-06T11:09:41.369Z
Modified
2024-11-27T19:40:48.342Z
Summary
[none]
Details

HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command.This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.

Database specific
{
    "cpes": [
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
        "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / vault

Package

Name
vault
Purl
pkg:bitnami/vault

Severity

  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.9
Introduced
1.12.0
Fixed
1.12.5
Introduced
1.13.0
Fixed
1.13.1