First published: Thu Mar 30 2023(Updated: )
A flaw was found in HashiCorp Vault and Vault Enterprise, which are vulnerable to SQL injection. This flaw allows a local authenticated attacker to send specially-crafted SQL statements to the Microsoft SQL (MSSQL) Database Storage Backend, which could allow the attacker to view, add, modify, or delete information in the backend database.
Credit: security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | <1.11.9 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.12.0<1.12.5 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
HashiCorp Vault | >=1.13.0<1.13.1 | |
redhat/Vault | <1.13.1 | 1.13.1 |
redhat/Vault | <1.12.5 | 1.12.5 |
redhat/and | <1.11.9 | 1.11.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0620 is a vulnerability in HashiCorp Vault and Vault Enterprise that allows SQL injection attacks when using the Microsoft SQL Database Storage Backend.
Versions 0.8.0 until 1.13.1 of HashiCorp Vault and Vault Enterprise are affected by CVE-2023-0620.
CVE-2023-0620 has a severity rating of 6.7 (medium).
To fix CVE-2023-0620, upgrade to a version of HashiCorp Vault and Vault Enterprise that is not affected by the vulnerability.
You can find more information about CVE-2023-0620 on the National Vulnerability Database (NVD) website, the HashiCorp forums, and the GitHub repository for HashiCorp Vault.