-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
The vulnerability stems from missing principal validation in SSH role configuration and certificate signing processes. Based on: 1) The CWE-732 pattern of improper permission assignment matches missing validation 2) HashiCorp's advisory mentions the new allow_empty_principals configuration default 3) The SSH secrets engine architecture requires role configuration validation before certificate signing. While exact function names aren't available in public sources, the roles.go and sign.go files are core to SSH secrets engine operations and would contain the validation logic that was previously insufficient.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/hashicorp/vault | go | >= 1.7.7, < 1.17.6 | 1.17.6 |