Improper Removal of Sensitive Information Before Storage or Transfer Affecting github.com/hashicorp/vault/ui/app/routes/vault/cluster package, versions <1.6.6>=1.7.0 <1.7.4


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMHASHICORPVAULTUIAPPROUTESVAULTCLUSTER-7786365
  • published22 Aug 2024
  • disclosed21 Aug 2024
  • creditAvinash Kumar

Introduced: 21 Aug 2024

CVE-2021-38554  (opens in a new tab)
CWE-212  (opens in a new tab)

How to fix?

Upgrade github.com/hashicorp/vault/ui/app/routes/vault/cluster to version 1.6.6, 1.7.4 or higher.

Overview

Affected versions of this package are vulnerable to Improper Removal of Sensitive Information Before Storage or Transfer due to improper handling of session data when the UI web application failed to clear the client-side data cache on user logout completely. An attacker can access sensitive information from previous sessions by exploiting shared browser sessions if the browser window/tab is not refreshed or closed between logout and subsequent login.

Note:

Vault deployments that do not enable the Vault UI are not affected by this issue.

Exploiting this vulnerability is possible if the following two conditions are met:

  1. The same browser instance must be used between sessions, and the window or tab must not have been closed or refreshed in between the user sessions.

  2. The exposed secret/s must have been viewed by the previous user.

CVSS Scores

version 4.0
version 3.1