Privilege escalation in HashiCorp go-getter



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-29810
CWE-ID CWE-532
Exploitation vector Local
Public exploit N/A
Vulnerable software
go-getter
Universal components / Libraries / Libraries used by multiple products

Vendor HashiCorp

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Inclusion of Sensitive Information in Log Files

EUVDB-ID: #VU64700

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-29810

CWE-ID: CWE-532 - Information Exposure Through Log Files

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to go-getter library can write SSH credentials into its log file. A local user with access to log files can read credentials in clear text, which may lead to privilege escalation or account takeover.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

go-getter: 1.0.0 - 1.5.10

CPE2.3 External links

https://github.com/hashicorp/go-getter/pull/348
https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc
https://github.com/hashicorp/go-getter/releases/tag/v1.5.11
https://bugzilla.redhat.com/show_bug.cgi?id=2080279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###