HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command.
This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://discuss.hashicorp.com/t/hcsec-2023-12-vault-s-microsoft-sql-database-storage-backend-vulnerable-to-sql-injection-via-configuration-file/52080/1 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20230526-0008/ - |
26 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9. |
Information
Published : 2023-03-30 01:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0620
Mitre link : CVE-2023-0620
CVE.ORG link : CVE-2023-0620
JSON object : View
Products Affected
hashicorp
- vault
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')