{"dataType":"CVE_RECORD","cveMetadata":{"cveId":"CVE-2024-2877","assignerOrgId":"67fedba0-ff2e-4543-ba5b-aa93e87718cc","state":"PUBLISHED","assignerShortName":"HashiCorp","dateReserved":"2024-03-25T20:59:41.034Z","datePublished":"2024-04-30T14:58:09.735Z","dateUpdated":"2025-02-13T17:47:31.156Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["64 bit","32 bit","x86","ARM","MacOS","Windows","Linux"],"product":"Vault Enterprise","vendor":"HashiCorp","versions":[{"lessThan":"1.15.8","status":"affected","version":"1.15.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Vault Enterprise, when configured with performance standby nodes and a configured audit device, will inadvertently log request headers on the standby node. These logs may have included sensitive HTTP request information in cleartext.\n\nThis vulnerability, CVE-2024-2877, was fixed in Vault Enterprise 1.15.8.</p><br/>"}],"value":"Vault Enterprise, when configured with performance standby nodes and a configured audit device, will inadvertently log request headers on the standby node. These logs may have included sensitive HTTP request information in cleartext.\n\nThis vulnerability, CVE-2024-2877, was fixed in Vault Enterprise 1.15.8."}],"impacts":[{"capecId":"CAPEC-215","descriptions":[{"lang":"en","value":"CAPEC-215: Fuzzing for application mapping"}]}],"metrics":[{"cvssV3_1":{"baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532: Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"67fedba0-ff2e-4543-ba5b-aa93e87718cc","shortName":"HashiCorp","dateUpdated":"2024-06-14T13:05:57.423Z"},"references":[{"url":"https://discuss.hashicorp.com/t/hsec-2024-10-vault-enterprise-leaks-sensitive-http-request-headers-in-audit-log-when-deployed-with-a-performance-standby-node"},{"url":"https://security.netapp.com/advisory/ntap-20240614-0002/"}],"source":{"advisory":"HCSEC-2024-10","discovery":"INTERNAL"},"title":"Vault Enterprise Leaks Sensitive HTTP Request Headers in the Audit Log When Deployed With a Performance Standby Node"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-06-21T15:56:14.828749Z","id":"CVE-2024-2877","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-21T15:56:24.200Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T19:25:42.154Z"},"title":"CVE Program Container","references":[{"url":"https://discuss.hashicorp.com/t/hsec-2024-10-vault-enterprise-leaks-sensitive-http-request-headers-in-audit-log-when-deployed-with-a-performance-standby-node","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20240614-0002/","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}