HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
References
Link | Resource |
---|---|
https://github.com/hashicorp/vault-action/pull/208 | Patch Third Party Advisory |
https://github.com/hashicorp/vault-action/issues/205 | Exploit Third Party Advisory |
https://github.com/hashicorp/vault-action/blob/master/CHANGELOG.md | Third Party Advisory |
https://discuss.hashicorp.com/t/hcsec-2021-13-vault-github-action-did-not-correctly-mask-multi-line-secrets-in-output/24128 | Vendor Advisory |
Configurations
Information
Published : 2021-05-06 22:15
Updated : 2021-05-14 14:13
NVD link : CVE-2021-32074
Mitre link : CVE-2021-32074
JSON object : View
CWE
CWE-532
Insertion of Sensitive Information into Log File
Products Affected
hashicorp
- vault-action