CVE-2023-3462

Source
https://cve.org/CVERecord?id=CVE-2023-3462
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3462.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-3462
Aliases
Related
Published
2023-07-31T23:15:10.360Z
Modified
2026-04-10T04:58:33.597219Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

HashiCorp's Vault and Vault Enterprise are vulnerable to user enumeration when using the LDAP auth method. An attacker may submit requests of existent and non-existent LDAP users and observe the response from Vault to check if the account is valid on the LDAP server. This vulnerability is fixed in Vault 1.14.1 and 1.13.5.

References

Affected packages

Git / github.com/hashicorp/vault

Affected ranges

Type
GIT
Repo
https://github.com/hashicorp/vault
Events
Introduced
Fixed
Introduced
Fixed
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "1.13.0"
        },
        {
            "fixed": "1.13.5"
        },
        {
            "introduced": "1.13.0"
        },
        {
            "fixed": "1.13.5"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.14.0"
        },
        {
            "introduced": "0"
        },
        {
            "last_affected": "1.14.0"
        }
    ]
}

Affected versions

api/auth/approle/v0.*
api/auth/approle/v0.1.0
api/auth/approle/v0.1.1
api/auth/approle/v0.2.0
api/auth/approle/v0.3.0
api/auth/approle/v0.4.0
api/auth/approle/v0.4.1
api/auth/aws/v0.*
api/auth/aws/v0.1.0
api/auth/aws/v0.2.0
api/auth/aws/v0.3.0
api/auth/aws/v0.4.0
api/auth/aws/v0.4.1
api/auth/azure/v0.*
api/auth/azure/v0.1.0
api/auth/azure/v0.2.0
api/auth/azure/v0.3.0
api/auth/azure/v0.4.0
api/auth/azure/v0.4.1
api/auth/gcp/v0.*
api/auth/gcp/v0.1.0
api/auth/gcp/v0.2.0
api/auth/gcp/v0.3.0
api/auth/gcp/v0.4.0
api/auth/gcp/v0.4.1
api/auth/kubernetes/v0.*
api/auth/kubernetes/v0.1.0
api/auth/kubernetes/v0.2.0
api/auth/kubernetes/v0.3.0
api/auth/kubernetes/v0.4.0
api/auth/kubernetes/v0.4.1
api/auth/ldap/v0.*
api/auth/ldap/v0.1.0
api/auth/ldap/v0.2.0
api/auth/ldap/v0.3.0
api/auth/ldap/v0.4.0
api/auth/ldap/v0.4.1
api/auth/userpass/v0.*
api/auth/userpass/v0.1.0
api/auth/userpass/v0.2.0
api/auth/userpass/v0.3.0
api/auth/userpass/v0.4.0
api/auth/userpass/v0.4.1
api/v1.*
api/v1.0.1
api/v1.0.2
api/v1.0.3
api/v1.0.4
api/v1.1.1
api/v1.2.0
api/v1.3.1
api/v1.5.0
api/v1.6.0
api/v1.7.0
api/v1.7.1
api/v1.7.2
api/v1.8.0
api/v1.8.1
api/v1.8.2
api/v1.8.3
api/v1.9.0
api/v1.9.1
api/v1.9.2
Other
last-go-modable
main-creation
sdk/v0.*
sdk/v0.1.10
sdk/v0.1.11
sdk/v0.1.12
sdk/v0.1.13
sdk/v0.1.8
sdk/v0.1.9
sdk/v0.2.1
sdk/v0.3.0
sdk/v0.4.1
sdk/v0.5.0
sdk/v0.5.1
sdk/v0.5.3
sdk/v0.6.0
sdk/v0.6.1
sdk/v0.6.2
sdk/v0.7.0
sdk/v0.8.0
sdk/v0.9.0
sdk/v0.9.1
v0.*
v0.1.0
v0.1.1
v0.1.2
v0.10.0
v0.10.0-rc1
v0.10.1
v0.10.2
v0.10.3
v0.10.4
v0.11.0
v0.11.0-beta1
v0.11.1
v0.11.2
v0.2.0
v0.2.0.rc1
v0.3.0
v0.3.0-rc
v0.3.1
v0.4.0
v0.4.0-rc1
v0.5.0
v0.5.0-rc1
v0.5.0-rc1.1
v0.5.0-rc1.2
v0.5.0-rc2
v0.5.1
v0.5.2
v0.6.0
v0.6.0-beta1
v0.6.0-beta2
v0.6.0-rc1
v0.6.0-rebuild
v0.6.1
v0.6.1-rc1
v0.6.1-rc2
v0.6.1-rc3
v0.6.2
v0.6.3
v0.6.4
v0.6.5
v0.7.0
v0.7.0-beta1
v0.7.1
v0.7.2
v0.7.3
v0.8.0
v0.8.0-beta1
v0.8.0-rc1
v0.8.1
v0.8.2
v0.8.3
v0.9.0
v0.9.1
v0.9.2
v0.9.4
v0.9.5
v0.9.6
v1.*
v1.0.0
v1.0.0-beta1
v1.0.0-beta2
v1.0.0-rc1
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.0-beta1
v1.1.0-beta2
v1.1.1
v1.13.0
v1.13.1
v1.13.2
v1.13.3
v1.13.4
v1.14.0
v1.14.0-rc1
v1.2.0
v1.2.0-beta1
v1.2.0-beta2
v1.2.0-rc1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-3462.json"