Miggo Logo

CVE-2023-6337: Memory exhaustion in HashiCorp Vault

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.70591%
Published
12/9/2023
Updated
2/13/2025
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/hashicorp/vaultgo>= 1.15.0, < 1.15.41.15.4
github.com/hashicorp/vaultgo>= 1.14.0, < 1.14.81.14.8
github.com/hashicorp/vaultgo>= 1.12.0, < 1.13.121.13.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unconstrained memory allocation when processing HTTP requests for rate limit checks. The GitHub PR #24354 shows the fix involved adding size limits using io.LimitReader when reading request bodies. This indicates the vulnerable code path was in request handling functions that process HTTP bodies without size constraints prior to applying rate limits. The handleRequest function (or equivalent middleware) would be responsible for this pre-rate-limit processing described in the advisory. The high confidence comes from: 1) The vulnerability directly relates to unbounded request body processing 2) The fix explicitly adds size limiting 3) The advisory specifies the vulnerable code exists in the rate limit check path before quotas are applied.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

**s*i*orp V*ult *n* V*ult *nt*rpris* *.**.* *n* n*w*r *r* vuln*r**l* to * **ni*l o* s*rvi** t*rou** m*mory *x**ustion o* t** *ost w**n **n*lin* l*r** un*ut**nti**t** *n* *ut**nti**t** *TTP r*qu*sts *rom * *li*nt. V*ult will *tt*mpt to m*p t** r*qu*st

Reasoning

T** vuln*r**ility st*ms *rom un*onstr*in** m*mory *llo**tion w**n pro**ssin* *TTP r*qu*sts *or r*t* limit ****ks. T** *it*u* PR #***** s*ows t** *ix involv** ***in* siz* limits usin* io.LimitR****r w**n r***in* r*qu*st *o*i*s. T*is in*i**t*s t** vuln