Improper Access Control Affecting github.com/hashicorp/vault/physical/raft package, versions >=1.4.0 <1.8.0


0.0
high
  • Attack Complexity

    High

  • Confidentiality

    High

  • Integrity

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMHASHICORPVAULTPHYSICALRAFT-1577143

  • published

    31 Aug 2021

  • disclosed

    30 Aug 2021

  • credit

    Unknown

How to fix?

Upgrade github.com/hashicorp/vault/physical/raft to version 1.8.0 or higher.

Overview

github.com/hashicorp/vault/physical/raft is a tool for secrets management, encryption as a service, and privileged access management.

Affected versions of this package are vulnerable to Improper Access Control. During initialization of the Integrated Storage backend, Vault creates a database file on disk with potentially excessive filesystem permissions, though these vary depending on the operating system’s umask values. This vault.db file is written to the location configured by the path parameter in Vault’s Raft configuration. Only Vault clusters utilizing Integrated Storage are affected.