Improper Access Control Affecting github.com/hashicorp/vault/physical/raft Open this link in a new tab package, versions >=1.4.0 <1.8.0
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
31 Aug 2021
30 Aug 2021
How to fix?
github.com/hashicorp/vault/physical/raft to version 1.8.0 or higher.
github.com/hashicorp/vault/physical/raft is a tool for secrets management, encryption as a service, and privileged access management.
Affected versions of this package are vulnerable to Improper Access Control. During initialization of the
Integrated Storage backend,
Vault creates a database file on disk with potentially excessive filesystem permissions, though these vary depending on the operating system’s umask values. This
vault.db file is written to the location configured by the
path parameter in
Vault clusters utilizing
Integrated Storage are affected.