{"id":"GO-2022-0632","summary":"Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault","details":"Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault in github.com/hashicorp/vault","aliases":["BIT-vault-2021-38554","CVE-2021-38554","GHSA-6239-28c2-9mrm"],"modified":"2026-02-04T02:47:08.182070Z","published":"2024-08-21T15:11:40Z","related":["CGA-r8mq-qj3f-7fpc"],"database_specific":{"review_status":"UNREVIEWED","url":"https://pkg.go.dev/vuln/GO-2022-0632"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-6239-28c2-9mrm"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-38554"},{"type":"WEB","url":"https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166"},{"type":"WEB","url":"https://github.com/hashicorp/vault/releases/tag/v1.6.6"},{"type":"WEB","url":"https://github.com/hashicorp/vault/releases/tag/v1.7.4"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202207-01"}],"affected":[{"package":{"name":"github.com/hashicorp/vault","ecosystem":"Go","purl":"pkg:golang/github.com/hashicorp/vault"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.6.6"},{"introduced":"1.7.0"},{"fixed":"1.7.4"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0632.json"}}],"schema_version":"1.7.3"}