First published: Mon Jun 24 2024(Updated: )
go-retryablehttp could allow a local authenticated attacker to obtain sensitive information, caused by the failure to sanitize urls when writing them to its log file. An attacker could exploit this vulnerability to write sensitive HTTP basic auth credentials to its log file.
Credit: security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/go-retryablehttp | <0.7.7 | 0.7.7 |
redhat/go-retryablehttp | <0.7.7 | 0.7.7 |
IBM Rational Team Concert | <=1.0.0, 1.0.1, 1.0.2, 1.0.2.1, 1.0.3 | |
HashiCorp Retryablehttp | <0.7.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6104 has a medium severity, as it can lead to the exposure of sensitive information.
To fix CVE-2024-6104, upgrade to the version 0.7.7 or later of the go-retryablehttp library.
CVE-2024-6104 can be exploited by a local authenticated attacker with access to the log files.
CVE-2024-6104 could expose sensitive HTTP basic authentication credentials written to the log file.
CVE-2024-6104 affects Hashicorp Retryablehttp library versions up to 0.7.7 and related packages.