CVE-2025-11374
- EPSS 0.02%
- Veröffentlicht 28.10.2025 20:19:05
- Zuletzt bearbeitet 30.10.2025 15:05:32
Consul and Consul Enterprise’s (“Consul”) key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterp...
CVE-2025-11375
- EPSS 0.02%
- Veröffentlicht 28.10.2025 20:12:14
- Zuletzt bearbeitet 30.10.2025 15:05:32
Consul and Consul Enterprise’s (“Consul”) event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul En...
CVE-2024-10086
- EPSS 0.7%
- Veröffentlicht 30.10.2024 22:15:03
- Zuletzt bearbeitet 10.01.2025 13:15:08
A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.
CVE-2024-10006
- EPSS 0.04%
- Veröffentlicht 30.10.2024 22:15:03
- Zuletzt bearbeitet 10.01.2025 13:15:08
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.
CVE-2024-10005
- EPSS 0.21%
- Veröffentlicht 30.10.2024 22:15:02
- Zuletzt bearbeitet 10.01.2025 13:15:08
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.
CVE-2023-5332
- EPSS 0.02%
- Veröffentlicht 04.12.2023 07:15:07
- Zuletzt bearbeitet 21.11.2024 08:41:33
Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.
CVE-2023-3518
- EPSS 0.17%
- Veröffentlicht 09.08.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 08:17:26
HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.
CVE-2023-1297
- EPSS 0.18%
- Veröffentlicht 02.06.2023 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:38:52
Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Cons...
CVE-2023-2816
- EPSS 0.21%
- Veröffentlicht 02.06.2023 23:15:09
- Zuletzt bearbeitet 21.11.2024 07:59:20
Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to ...
CVE-2023-0845
- EPSS 0.32%
- Veröffentlicht 09.03.2023 16:15:09
- Zuletzt bearbeitet 21.11.2024 07:37:56
Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.