Boundary vulnerable to session hijacking through TLS certificate tampering
High severity
GitHub Reviewed
Published
Feb 5, 2024
to the GitHub Advisory Database
•
Updated Feb 5, 2024
Package
Affected versions
>= 0.8.0, < 0.15.0
Patched versions
0.15.0
Description
Published by the National Vulnerability Database
Feb 5, 2024
Published to the GitHub Advisory Database
Feb 5, 2024
Reviewed
Feb 5, 2024
Last updated
Feb 5, 2024
Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application.
References