Access Control Bypass Affecting github.com/hashicorp/vault/builtin/logical/pki Open this link in a new tab package, versions >=1.7.0 <1.7.1 >=1.6.0 <1.6.4 >=1.5.1 <1.5.8
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMHASHICORPVAULTBUILTINLOGICALPKI-1255571
-
published
26 Apr 2021
-
disclosed
26 Apr 2021
-
credit
Unknown
Introduced: 26 Apr 2021
CVE-2021-29653 Open this link in a new tabHow to fix?
Upgrade github.com/hashicorp/vault/builtin/logical/pki
to version 1.7.1, 1.6.4, 1.5.8 or higher.
Overview
Affected versions of this package are vulnerable to Access Control Bypass. It was discovered that a change to the tidy_revoked_certs
logic in the PKI Secrets Engine, released in Vault 1.5.1, had an unintended effect of removing revoked-but-unexpired certificates from Vault’s CRL. Environments that utilize this feature may have such certificates excluded from their CRL after a tidy operation and subsequently treated as valid since they are no longer in the CRL and not yet past their NotAfter
value.