Loading HuntDB...

GHSA-2qmw-pvf7-4mw6

GitHub Security Advisory

Hashicorp Vault vulnerable to Improper Check or Handling of Exceptional Conditions

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Vault and Vault Enterprise did not properly handle requests originating from unauthorized IP addresses when the TCP listener option, proxy_protocol_behavior, was set to deny_unauthorized. When receiving a request from a source IP address that was not listed in proxy_protocol_authorized_addrs, the Vault API server would shut down and no longer respond to any HTTP requests, potentially resulting in denial of service.

While this bug also affected versions of Vault up to 1.17.1 and 1.16.5, a separate regression in those release series did not allow Vault operators to configure the deny_unauthorized option, thus not allowing the conditions for the denial of service to occur.

Fixed in Vault and Vault Enterprise 1.17.2, 1.16.6, and 1.15.12

Affected Packages

Go github.com/hashicorp/vault
Affected versions: 1.10.0 (fixed in 1.15.12)
Go github.com/hashicorp/vault
Affected versions: 1.16.0-rc1 (fixed in 1.16.3)
Go github.com/hashicorp/vault
Affected versions: 1.17.0-rc1 (fixed in 1.17.2)

Related CVEs

Key Information

GHSA ID
GHSA-2qmw-pvf7-4mw6
Published
July 11, 2024 9:31 PM
Last Modified
September 6, 2024 9:38 PM
CVSS Score
7.5 /10
Primary Ecosystem
Go
Primary Package
github.com/hashicorp/vault
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 7, 2025 6:28 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.