{ "schema_version": "1.4.0", "id": "GHSA-fp52-qw33-mfmw", "modified": "2023-08-29T22:39:27Z", "published": "2021-08-02T17:11:41Z", "aliases": [ "CVE-2020-16250" ], "summary": "Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault", "details": "HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" } ], "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/vault" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0.8.1" }, { "fixed": "1.2.5" } ] } ] }, { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/vault" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.3.0" }, { "fixed": "1.3.8" } ] } ] }, { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/vault" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.4.0" }, { "fixed": "1.4.4" } ] } ] }, { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/vault" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "1.5.0" }, { "fixed": "1.5.1" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-16250" }, { "type": "PACKAGE", "url": "https://github.com/hashicorp/vault" }, { "type": "WEB", "url": "https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151" }, { "type": "WEB", "url": "https://www.hashicorp.com/blog/category/vault" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html" } ], "database_specific": { "cwe_ids": [ "CWE-290", "CWE-345" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-07-26T18:55:09Z", "nvd_published_at": "2020-08-26T15:15:00Z" } }