GHSA-4mgv-m5cm-f9h7

Suggest an improvement
Source
https://github.com/advisories/GHSA-4mgv-m5cm-f9h7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-4mgv-m5cm-f9h7/GHSA-4mgv-m5cm-f9h7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4mgv-m5cm-f9h7
Aliases
Published
2022-05-24T19:01:50Z
Modified
2024-01-25T19:58:46Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Vault GitHub Action did not correctly mask multi-line secrets in output
Details

HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.

The vault-action implementation did not correctly handle the marking of multi-line variables. As a result, multi-line secrets were not correctly masked in vault-action output.

Remediation: Customers using vault-action should evaluate the risk associated with this issue, and consider upgrading to vault-action 2.2.0 or newer. Please refer to https://github.com/marketplace/actions/hashicorp-vault for more information.

Database specific
{
    "nvd_published_at": "2021-05-07T05:15:00Z",
    "cwe_ids": [
        "CWE-532"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2022-07-29T19:57:46Z"
}
References

Affected packages

GitHub Actions / hashicorp/vault-action

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.0