Show filters
167 Total Results
Displaying 91-100 of 167
Sort by:
Attacker Value
Unknown
CVE-2021-43415
Disclosure Date: December 03, 2021 (last updated February 23, 2025)
HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.
0
Attacker Value
Unknown
CVE-2021-43998
Disclosure Date: November 30, 2021 (last updated February 23, 2025)
HashiCorp Vault and Vault Enterprise 0.11.0 up to 1.7.5 and 1.8.4 templated ACL policies would always match the first-created entity alias if multiple entity aliases exist for a specified entity and mount combination, potentially resulting in incorrect policy enforcement. Fixed in Vault and Vault Enterprise 1.7.6, 1.8.5, and 1.9.0.
0
Attacker Value
Unknown
CVE-2021-42135
Disclosure Date: October 11, 2021 (last updated February 23, 2025)
HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.
0
Attacker Value
Unknown
CVE-2021-41802
Disclosure Date: October 08, 2021 (last updated February 23, 2025)
HashiCorp Vault and Vault Enterprise through 1.7.4 and 1.8.3 allowed a user with write permission to an entity alias ID sharing a mount accessor with another user to acquire this other user’s policies by merging their identities. Fixed in Vault and Vault Enterprise 1.7.5 and 1.8.4.
0
Attacker Value
Unknown
CVE-2021-41865
Disclosure Date: October 07, 2021 (last updated November 28, 2024)
HashiCorp Nomad and Nomad Enterprise 1.1.1 through 1.1.5 allowed authenticated users with job submission capabilities to cause denial of service by submitting incomplete job specifications with a Consul mesh gateway and host networking mode. Fixed in 1.1.6.
0
Attacker Value
Unknown
CVE-2021-40862
Disclosure Date: September 15, 2021 (last updated February 23, 2025)
HashiCorp Terraform Enterprise up to v202108-1 contained an API endpoint that erroneously disclosed a sensitive URL to authenticated parties, which could be used for privilege escalation or unauthorized modification of a Terraform configuration. Fixed in v202109-1.
0
Attacker Value
Unknown
CVE-2021-38698
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
0
Attacker Value
Unknown
CVE-2021-37218
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
HashiCorp Nomad and Nomad Enterprise Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.0.10 and 1.1.4.
0
Attacker Value
Unknown
CVE-2021-37219
Disclosure Date: September 07, 2021 (last updated February 23, 2025)
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
0
Attacker Value
Unknown
CVE-2021-27668
Disclosure Date: August 31, 2021 (last updated February 23, 2025)
HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.
0