Hashicorp

Consul

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.35%
  • Veröffentlicht 30.10.2024 22:15:03
  • Zuletzt bearbeitet 10.01.2025 13:15:08

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

  • EPSS 0.06%
  • Veröffentlicht 30.10.2024 22:15:03
  • Zuletzt bearbeitet 10.01.2025 13:15:08

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.

  • EPSS 0.08%
  • Veröffentlicht 30.10.2024 22:15:02
  • Zuletzt bearbeitet 10.01.2025 13:15:08

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.

Exploit
  • EPSS 0.02%
  • Veröffentlicht 04.12.2023 07:15:07
  • Zuletzt bearbeitet 21.11.2024 08:41:33

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

  • EPSS 0.17%
  • Veröffentlicht 09.08.2023 16:15:09
  • Zuletzt bearbeitet 21.11.2024 08:17:26

HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.

  • EPSS 0.16%
  • Veröffentlicht 02.06.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:59:20

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to ...

  • EPSS 0.16%
  • Veröffentlicht 02.06.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:38:52

Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Cons...

  • EPSS 0.32%
  • Veröffentlicht 09.03.2023 16:15:09
  • Zuletzt bearbeitet 21.11.2024 07:37:56

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

  • EPSS 0.35%
  • Veröffentlicht 16.11.2022 00:15:09
  • Zuletzt bearbeitet 21.11.2024 07:20:32

HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0.

  • EPSS 0.26%
  • Veröffentlicht 23.09.2022 12:15:10
  • Zuletzt bearbeitet 27.05.2025 15:15:28

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5,...