Improper Access Control Affecting github.com/hashicorp/vault/physical/raft Open this link in a new tab package, versions >=1.4.0 <1.8.0
Attack Complexity
High
Confidentiality
High
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMHASHICORPVAULTPHYSICALRAFT-1577143
-
published
31 Aug 2021
-
disclosed
30 Aug 2021
-
credit
Unknown
Introduced: 30 Aug 2021
CVE-2021-38553 Open this link in a new tabHow to fix?
Upgrade github.com/hashicorp/vault/physical/raft
to version 1.8.0 or higher.
Overview
github.com/hashicorp/vault/physical/raft is a tool for secrets management, encryption as a service, and privileged access management.
Affected versions of this package are vulnerable to Improper Access Control. During initialization of the Integrated Storage
backend, Vault
creates a database file on disk with potentially excessive filesystem permissions, though these vary depending on the operating system’s umask values. This vault.db
file is written to the location configured by the path
parameter in Vault
’s Raft
configuration.
Only Vault
clusters utilizing Integrated Storage
are affected.