Description
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0734 | Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application. |
Github GHSA |
GHSA-vh73-q3rw-qx7w | Boundary vulnerable to session hijacking through TLS certificate tampering |
References
History
No history.
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2024-08-01T18:26:30.420Z
Reserved: 2024-01-29T20:35:33.313Z
Link: CVE-2024-1052
Updated: 2024-08-01T18:26:30.420Z
Status : Modified
Published: 2024-02-05T21:15:11.640
Modified: 2024-11-21T08:49:41.313
Link: CVE-2024-1052
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA