Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10086

Опубликовано: 30 окт. 2024
Источник: debian
EPSS Низкий

Описание

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
consulremovedpackage
consulend-of-lifebullseyepackage

Примечания

  • https://github.com/advisories/GHSA-99wr-c2px-grmh

  • https://github.com/hashicorp/consul/commit/07fae7bb0be8593cc98c38b1ef4a49ed9188932f (v1.20.0-rc1)

EPSS

Процентиль: 32%
0.0012
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
8 месяцев назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
redhat
8 месяцев назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
nvd
8 месяцев назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
github
8 месяцев назад

Hashicorp Consul Cross-site Scripting vulnerability

CVSS3: 6.1
fstec
8 месяцев назад

Уязвимость инструмента настройки сервиса Consul, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)

EPSS

Процентиль: 32%
0.0012
Низкий