CVE-2025-49829

6.5 MEDIUM

📋 TL;DR

This vulnerability in Conjur secrets management software allows authenticated attackers to inject unauthorized resources into the database and bypass permission checks. It affects Conjur OSS before version 1.22.1 and Secrets Manager, Self-Hosted (formerly Conjur Enterprise) before versions 13.5.1 and 13.6.1. Attackers with valid credentials can potentially access or modify secrets they shouldn't have permission to view.

💻 Affected Systems

Products:
  • Conjur OSS
  • Secrets Manager, Self-Hosted (formerly Conjur Enterprise)
Versions: Conjur OSS < 1.22.1, Secrets Manager, Self-Hosted < 13.5.1 and < 13.6.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access all secrets stored in Conjur, including credentials, API keys, certificates, and sensitive configuration data, leading to complete compromise of infrastructure and applications.

🟠

Likely Case

Attackers with some level of access could escalate privileges to access additional secrets beyond their intended permissions, potentially compromising specific applications or services.

🟢

If Mitigated

With proper network segmentation, monitoring, and least-privilege access controls, impact would be limited to specific resources rather than complete compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but no special privileges. The advisory provides technical details but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Conjur OSS 1.22.1, Secrets Manager, Self-Hosted 13.5.1 or 13.6.1

Vendor Advisory: https://github.com/cyberark/conjur/security/advisories/GHSA-9w76-m74g-4c2r

Restart Required: Yes

Instructions:

1. Backup your Conjur configuration and data. 2. Stop Conjur services. 3. Upgrade to patched version using your deployment method (Docker, Kubernetes, package manager). 4. Restart services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Conjur to only trusted sources and applications that require secrets access.

Enhanced Monitoring

all

Implement strict monitoring of Conjur API calls and database operations for unusual patterns.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Conjur from untrusted networks
  • Enforce least-privilege access controls and regularly audit user permissions

🔍 How to Verify

Check if Vulnerable:

Check Conjur version via API endpoint or configuration file. For Conjur OSS: check version in deployment configuration or run 'conjur --version' if available.

Check Version:

curl -k https://conjur-server/info or check deployment configuration files

Verify Fix Applied:

Verify version is 1.22.1 or higher for Conjur OSS, or 13.5.1/13.6.1 or higher for Secrets Manager, Self-Hosted. Test permission enforcement with controlled access tests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database write operations
  • Permission check bypass attempts
  • Resource creation by unauthorized users
  • Failed authorization attempts followed by successful operations

Network Indicators:

  • Unusual API call patterns to Conjur endpoints
  • Bursts of database operations from application servers

SIEM Query:

source="conjur" AND (event_type="resource_creation" OR event_type="permission_check") AND result="success" AND user NOT IN authorized_users_list

🔗 References

📤 Share & Export