Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-10086

Опубликовано: 30 окт. 2024
Источник: debian

Описание

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
consulremovedpackage
consulend-of-lifebullseyepackage

Примечания

  • https://github.com/advisories/GHSA-99wr-c2px-grmh

  • https://github.com/hashicorp/consul/commit/07fae7bb0be8593cc98c38b1ef4a49ed9188932f (v1.20.0-rc1)

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 1 года назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
redhat
больше 1 года назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
nvd
больше 1 года назад

A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

CVSS3: 6.1
github
больше 1 года назад

Hashicorp Consul Cross-site Scripting vulnerability

CVSS3: 6.1
fstec
больше 1 года назад

Уязвимость инструмента настройки сервиса Consul, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)