Vulnerability identifier: #VU64700
Vulnerability risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-532
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
go-getter
Universal components / Libraries /
Libraries used by multiple products
Vendor: HashiCorp
Description
The vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to go-getter library can write SSH credentials into its log file. A local user with access to log files can read credentials in clear text, which may lead to privilege escalation or account takeover.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
go-getter: 1.0.0 - 1.5.10
External links
http://github.com/hashicorp/go-getter/pull/348
http://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc
http://github.com/hashicorp/go-getter/releases/tag/v1.5.11
http://bugzilla.redhat.com/show_bug.cgi?id=2080279
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.