aws/resource_aws_iam_user_login_profile.go in the HashiCorp Terraform Amazon Web Services (AWS) provider through v1.12.0 has an inappropriate PRNG algorithm and seeding, which makes it easier for remote attackers to obtain access by leveraging an IAM account that was provisioned with a weak password.
References
Link | Resource |
---|---|
https://github.com/terraform-providers/terraform-provider-aws/pull/3934 | Issue Tracking Patch Third Party Advisory |
https://github.com/terraform-providers/terraform-provider-aws/pull/3934 | Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/terraform-providers/terraform-provider-aws/pull/3934 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2018-03-27 18:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-9057
Mitre link : CVE-2018-9057
CVE.ORG link : CVE-2018-9057
JSON object : View
Products Affected
hashicorp
- terraform
CWE
CWE-332
Insufficient Entropy in PRNG