Privilege escalation in HashiCorp go-getter



Published: 2022-06-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-29810
CWE-ID CWE-532
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
go-getter
Universal components / Libraries / Libraries used by multiple products

Vendor HashiCorp

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU64700

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2022-29810

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to go-getter library can write SSH credentials into its log file. A local user with access to log files can read credentials in clear text, which may lead to privilege escalation or account takeover.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

go-getter: 1.0.0 - 1.5.10


CPE2.3 External links

http://github.com/hashicorp/go-getter/pull/348
http://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc
http://github.com/hashicorp/go-getter/releases/tag/v1.5.11
http://bugzilla.redhat.com/show_bug.cgi?id=2080279

Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###