Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-2816

Опубликовано: 02 июн. 2023
Источник: debian
EPSS Низкий

Описание

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
consulnot-affectedpackage

Примечания

  • https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525

EPSS

Процентиль: 37%
0.00156
Низкий

Связанные уязвимости

CVSS3: 8.7
ubuntu
больше 2 лет назад

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

CVSS3: 8.7
nvd
больше 2 лет назад

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

CVSS3: 6.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 8.7
github
больше 2 лет назад

Hashicorp Consul allows user with service:write permissions to patch remote proxy instances

EPSS

Процентиль: 37%
0.00156
Низкий