Skip to content

Use of a Broken or Risky Cryptographic Algorithm in Terraform

High severity GitHub Reviewed Published May 18, 2021 to the GitHub Advisory Database • Updated Sep 29, 2023

Package

gomod github.com/hashicorp/terraform (Go)

Affected versions

< 0.12.17

Patched versions

0.12.17

Description

When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.

Specific Go Packages Affected

github.com/hashicorp/terraform/backend/remote-state/azure

References

Published by the National Vulnerability Database Dec 2, 2019
Reviewed May 13, 2021
Published to the GitHub Advisory Database May 18, 2021
Last updated Sep 29, 2023

Severity

High
7.5
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE ID

CVE-2019-19316

GHSA ID

GHSA-h3p9-wrgx-82cm

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.