Privilege escalation in HashiCorp go-getter

Published: 2022-06-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-29810
Exploitation vector Local
Public exploit N/A
Vulnerable software
Universal components / Libraries / Libraries used by multiple products

Vendor HashiCorp

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU64700

Risk: Low


CVE-ID: CVE-2022-29810

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No


The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to go-getter library can write SSH credentials into its log file. A local user with access to log files can read credentials in clear text, which may lead to privilege escalation or account takeover.


Install updates from vendor's website.

Vulnerable software versions

go-getter: 1.0.0 - 1.5.10

CPE2.3 External links

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?