First published: Wed Jun 10 2020(Updated: )
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File. The vulnerability is affecting `github.com/hashicorp/vault/command` Go package.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/vault | >=1.4.0<1.4.2 | 1.4.2 |
go/github.com/hashicorp/vault | >=1.3.0<1.3.6 | 1.3.6 |
HashiCorp Vault | <1.3.6 | |
HashiCorp Vault | >=1.4.0<1.4.2 | |
HashiCorp Vault | <1.3.6 | |
HashiCorp Vault | >=1.4.0<1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HashiCorp Vault vulnerability is CVE-2020-13223.
The severity of CVE-2020-13223 is high with a CVSS score of 7.5.
HashiCorp Vault and Vault Enterprise versions before 1.3.6 and before 1.4.2 are affected by CVE-2020-13223.
CVE-2020-13223 allows sensitive information to be inserted into a log file in HashiCorp Vault.
To fix CVE-2020-13223, upgrade HashiCorp Vault and Vault Enterprise to version 1.3.6 or 1.4.2.