HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
The vault-action implementation did not correctly handle the marking of multi-line variables. As a result, multi-line secrets were not correctly masked in vault-action output.
Remediation: Customers using vault-action should evaluate the risk associated with this issue, and consider upgrading to vault-action 2.2.0 or newer. Please refer to https://github.com/marketplace/actions/hashicorp-vault for more information.
{ "nvd_published_at": "2021-05-07T05:15:00Z", "cwe_ids": [ "CWE-532" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-07-29T19:57:46Z" }