CVE-2023-2121
Vault’s KV Diff Viewer Allowed for HTML Injection
Severity Score
5.4
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.
A flaw was found in HashiCorp Vault and Vault Enterprise, where they are vulnerable to Cross-site scripting caused by improper validation of user-supplied input by the key-value v2 (kv-v2) diff viewer. A remote, authenticated attacker can inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site once the page is viewed. This flaw allows an attacker to steal the victim's cookie-based authentication credentials.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-04-17 CVE Reserved
- 2023-06-09 CVE Published
- 2025-01-06 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | < 1.11.11 Search vendor "Hashicorp" for product "Vault" and version " < 1.11.11" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | < 1.11.11 Search vendor "Hashicorp" for product "Vault" and version " < 1.11.11" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.12.0 < 1.12.7 Search vendor "Hashicorp" for product "Vault" and version " >= 1.12.0 < 1.12.7" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.12.0 < 1.12.7 Search vendor "Hashicorp" for product "Vault" and version " >= 1.12.0 < 1.12.7" | enterprise |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.13.0 < 1.13.3 Search vendor "Hashicorp" for product "Vault" and version " >= 1.13.0 < 1.13.3" | - |
Affected
| ||||||
Hashicorp Search vendor "Hashicorp" | Vault Search vendor "Hashicorp" for product "Vault" | >= 1.13.0 < 1.13.3 Search vendor "Hashicorp" for product "Vault" and version " >= 1.13.0 < 1.13.3" | enterprise |
Affected
|