{"id":"CVE-2021-27668","details":"HashiCorp Vault Enterprise 0.9.2 through 1.6.2 allowed the read of license metadata from DR secondaries without authentication. Fixed in 1.6.3.","aliases":["BIT-vault-2021-27668"],"modified":"2026-03-15T22:40:02.964253Z","published":"2021-08-31T18:15:07.843Z","references":[{"type":"ADVISORY","url":"https://discuss.hashicorp.com/t/hcsec-2021-05-vault-enterprise-s-dr-secondaries-exposed-license-metadata-without-authentication/21427"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202207-01"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hashicorp/vault","events":[{"introduced":"3bf8733cd69bb0ac14da9aaa6135bcb7f710cc5f"},{"fixed":"b540be4b7ec48d0dd7512c8d8df9399d6bf84d76"}],"database_specific":{"versions":[{"introduced":"0.9.2"},{"fixed":"1.6.3"}]}}],"versions":["api/v1.0.1","api/v1.0.2","api/v1.0.3","api/v1.0.4","sdk/v0.1.10","sdk/v0.1.11","sdk/v0.1.12","sdk/v0.1.13","sdk/v0.1.8","sdk/v0.1.9","v0.10.0","v0.10.0-rc1","v0.10.1","v0.10.2","v0.10.3","v0.10.4","v0.11.0","v0.11.0-beta1","v0.11.1","v0.11.2","v0.11.3","v0.11.4","v0.9.2","v0.9.3","v0.9.4","v0.9.5","v0.9.6","v1.0.0","v1.0.0-beta1","v1.0.0-beta2","v1.0.0-rc1","v1.0.1","v1.0.2","v1.0.3","v1.1.0","v1.1.0-beta1","v1.1.0-beta2","v1.1.1","v1.1.2","v1.2.0","v1.2.0-beta1","v1.2.0-beta2","v1.2.0-rc1","v1.6.0","v1.6.0-rc","v1.6.1","v1.6.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-27668.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}]}