CVE-2024-1052 – github.com/hashicorp/boundary
Package
Manager: go
Name: github.com/hashicorp/boundary
Vulnerable Version: >=0.8.0 <0.15.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00303 pctl0.53097
Details
Boundary vulnerable to session hijacking through TLS certificate tampering Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Metadata
Created: 2024-02-05T21:30:31Z
Modified: 2024-02-05T23:06:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/02/GHSA-vh73-q3rw-qx7w/GHSA-vh73-q3rw-qx7w.json
CWE IDs: ["CWE-295"]
Alternative ID: GHSA-vh73-q3rw-qx7w
Finding: F163
Auto approve: 1