First published: Mon Dec 02 2019(Updated: )
When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/terraform | <0.12.17 | 0.12.17 |
HashiCorp Terraform | <0.12.17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-19316 is high (7.5).
CVE-2019-19316 affects Terraform versions prior to 0.12.17.
CVE-2019-19316 allows the transmission of the token and state snapshot using cleartext HTTP when using the Azure backend with a shared access signature (SAS).
To remediate CVE-2019-19316, upgrade Terraform to version 0.12.17 or above.
Yes, you can find references for CVE-2019-19316 at: [GitHub Advisory](https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-19316), [GitHub Issue](https://github.com/hashicorp/terraform/issues/23493).