Vulnerability identifier: #VU50454
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Vault
Web applications /
Modules and components for CMS
Vault Enterprise
Web applications /
Modules and components for CMS
Vendor: HashiCorp
Description
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
HashiCorp Vault and Vault Enterprise disclosed the internal IP address of the Vault node when responding to some invalid, unauthenticated HTTP requests.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Vault: 1.5.0 - 1.5.6, 1.6.0 - 1.6.1
Vault Enterprise: 1.5.0 - 1.5.6, 1.6.0 - 1.6.1
External links
https://discuss.hashicorp.com/t/hcsec-2021-02-vault-api-endpoint-exposed-internal-ip-address-without-authentication/20334
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.