CVE-2022-3920
- EPSS 0.41%
- Veröffentlicht 16.11.2022 00:15:09
- Zuletzt bearbeitet 21.11.2024 07:20:32
HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0.
CVE-2022-40716
- EPSS 0.26%
- Veröffentlicht 23.09.2022 12:15:10
- Zuletzt bearbeitet 27.05.2025 15:15:28
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5,...
CVE-2021-41803
- EPSS 0.27%
- Veröffentlicht 23.09.2022 01:15:08
- Zuletzt bearbeitet 27.05.2025 16:15:21
HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."
CVE-2022-29153
- EPSS 86.06%
- Veröffentlicht 19.04.2022 16:17:10
- Zuletzt bearbeitet 21.11.2024 06:58:35
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
CVE-2022-24687
- EPSS 0.44%
- Veröffentlicht 24.02.2022 16:15:08
- Zuletzt bearbeitet 21.11.2024 06:50:52
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, and 1.11.2 clusters with at least one Ingress Gateway allow a user with service:write to register a specifically-defined service that can cause Consul servers to panic. Fixed in 1.9...
CVE-2021-41805
- EPSS 2.3%
- Veröffentlicht 12.12.2021 05:15:07
- Zuletzt bearbeitet 21.11.2024 06:26:47
HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a di...
CVE-2021-37219
- EPSS 0.66%
- Veröffentlicht 07.09.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:14:53
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.
CVE-2021-38698
- EPSS 0.69%
- Veröffentlicht 07.09.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:17:55
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
CVE-2021-36213
- EPSS 0.77%
- Veröffentlicht 17.07.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:13:19
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.10.0 default deny policy with a single L7 application-aware intention deny action cancels out, causing the intention to incorrectly fail open, allowing L4 traffic. Fixed in 1.9.8 and 1.10.1.
CVE-2021-32574
- EPSS 0.8%
- Veröffentlicht 17.07.2021 18:15:07
- Zuletzt bearbeitet 21.11.2024 06:07:18
HashiCorp Consul and Consul Enterprise 1.3.0 through 1.10.0 Envoy proxy TLS configuration does not validate destination service identity in the encoded subject alternative name. Fixed in 1.8.14, 1.9.8, and 1.10.1.