logo

CVE-2024-1052 github.com/hashicorp/boundary

Package

Manager: go
Name: github.com/hashicorp/boundary
Vulnerable Version: >=0.8.0 <0.15.0

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00303 pctl0.53097

Details

Boundary vulnerable to session hijacking through TLS certificate tampering Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.

Metadata

Created: 2024-02-05T21:30:31Z
Modified: 2024-02-05T23:06:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-vh73-q3rw-qx7w/GHSA-vh73-q3rw-qx7w.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-vh73-q3rw-qx7w
Finding: F163
Auto approve: 1