HashiCorp vault-action (aka Vault GitHub Action) before 2.2.0 allows attackers to obtain sensitive information from log files because a multi-line secret was not correctly registered with GitHub Actions for log masking.
The product writes sensitive information to a log file.
Link | Tags |
---|---|
https://github.com/hashicorp/vault-action/blob/master/CHANGELOG.md | third party advisory |
https://github.com/hashicorp/vault-action/pull/208 | third party advisory patch |
https://github.com/hashicorp/vault-action/issues/205 | third party advisory exploit |
https://discuss.hashicorp.com/t/hcsec-2021-13-vault-github-action-did-not-correctly-mask-multi-line-secrets-in-output/24128 | vendor advisory |