HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command.
This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
References
Link | Resource |
---|---|
https://discuss.hashicorp.com/t/hcsec-2023-12-vault-s-microsoft-sql-database-storage-backend-vulnerable-to-sql-injection-via-configuration-file/52080/1 | Issue Tracking Patch Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230526-0008/ |
Configurations
Configuration 1 (hide)
|
History
26 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9. |
Information
Published : 2023-03-30 01:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-0620
Mitre link : CVE-2023-0620
CVE.ORG link : CVE-2023-0620
JSON object : View
Products Affected
hashicorp
- vault
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')