Incorrect Permission Assignment for Critical Resource Affecting github.com/hashicorp/vault/builtin/logical/ssh package, versions >=1.7.7 <1.17.6
Threat Intelligence
EPSS
0.04% (11th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMHASHICORPVAULTBUILTINLOGICALSSH-8102334
- published 27 Sep 2024
- disclosed 26 Sep 2024
- credit Jörn Heissler
Introduced: 26 Sep 2024
CVE-2024-7594 Open this link in a new tabHow to fix?
Upgrade github.com/hashicorp/vault/builtin/logical/ssh
to version 1.17.6 or higher.
Overview
Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to not requiring the valid_principals
list to contain a value by default. An attacker could authenticate as any user on the host by using an SSH certificate requested by an authorized user to Vault’s SSH secrets engine.
Note:
This can be exploited if the valid_principals
and default_user
fields of the SSH secrets engine configuration are not set.