CVE-2023-0620

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-0620
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-0620.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-0620
Aliases
Related
Withdrawn
2024-05-15T05:32:52.053604Z
Published
2023-03-30T01:15:07Z
Modified
2024-08-20T20:58:48.280483Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command.

This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.

References

Affected packages

Git / github.com/hashicorp/vault

Affected ranges

Type
GIT
Repo
https://github.com/hashicorp/vault
Events

Affected versions

v1.*

v1.12.0
v1.12.1
v1.12.2
v1.12.3
v1.12.4