First published: Fri May 07 2021(Updated: )
HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
actions/hashicorp/vault-action | <2.2.0 | 2.2.0 |
HashiCorp Vault | >=0.1.0<2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32074 is classified as a high severity vulnerability due to the potential exposure of sensitive information from log files.
To fix CVE-2021-32074, update the HashiCorp vault-action to version 2.2.0 or later.
CVE-2021-32074 can expose multi-line secrets stored in GitHub Actions log files.
Yes, CVE-2021-32074 affects all versions of HashiCorp vault-action before 2.2.0.
Yes, CVE-2021-32074 can be exploited remotely by attackers who have access to the GitHub Actions logs.