Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0734 Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
Github GHSA Github GHSA GHSA-vh73-q3rw-qx7w Boundary vulnerable to session hijacking through TLS certificate tampering
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published:

Updated: 2024-08-01T18:26:30.420Z

Reserved: 2024-01-29T20:35:33.313Z

Link: CVE-2024-1052

cve-icon Vulnrichment

Updated: 2024-08-01T18:26:30.420Z

cve-icon NVD

Status : Modified

Published: 2024-02-05T21:15:11.640

Modified: 2024-11-21T08:49:41.313

Link: CVE-2024-1052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses