First published: Thu Mar 30 2023(Updated: )
HashiCorp Vault and Vault Enterprise versions 0.8.0 until 1.13.1 are vulnerable to an SQL injection attack when using the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin, certain parameters are required to establish a connection (schema, database, and table) are not sanitized when passed to the user-provided MSSQL database. A privileged attacker with the ability to write arbitrary data to Vault's configuration may modify these parameters to execute a malicious SQL command when the Vault configuration is applied. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
Credit: security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
redhat/Vault | <1.13.1 | 1.13.1 |
redhat/Vault | <1.12.5 | 1.12.5 |
redhat/and | <1.11.9 | 1.11.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0620 is a vulnerability in HashiCorp Vault and Vault Enterprise that allows SQL injection attacks when using the Microsoft SQL Database Storage Backend.
Versions 0.8.0 until 1.13.1 of HashiCorp Vault and Vault Enterprise are affected by CVE-2023-0620.
CVE-2023-0620 has a severity rating of 6.7 (medium).
To fix CVE-2023-0620, upgrade to a version of HashiCorp Vault and Vault Enterprise that is not affected by the vulnerability.
You can find more information about CVE-2023-0620 on the National Vulnerability Database (NVD) website, the HashiCorp forums, and the GitHub repository for HashiCorp Vault.