#VU64700 Inclusion of Sensitive Information in Log Files in go-getter


Published: 2022-06-27 | Updated: 2022-06-28

Vulnerability identifier: #VU64700

Vulnerability risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-29810

CWE-ID: CWE-532

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
go-getter
Universal components / Libraries / Libraries used by multiple products

Vendor: HashiCorp

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to go-getter library can write SSH credentials into its log file. A local user with access to log files can read credentials in clear text, which may lead to privilege escalation or account takeover.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

go-getter: 1.0.0 - 1.5.10


External links
http://github.com/hashicorp/go-getter/pull/348
http://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc
http://github.com/hashicorp/go-getter/releases/tag/v1.5.11
http://bugzilla.redhat.com/show_bug.cgi?id=2080279


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability