Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wj6x-hcc2-f32j

Опубликовано: 09 мар. 2023
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Consul Server Panic when Ingress and API Gateways Configured with Peering Connections

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service.

Пакеты

Наименование

github.com/hashicorp/consul

go
Затронутые версииВерсия исправления

>= 1.14.0, < 1.14.5

1.14.5

EPSS

Процентиль: 52%
0.00287
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-476

Связанные уязвимости

CVSS3: 4.9
ubuntu
больше 2 лет назад

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

CVSS3: 6.5
redhat
больше 2 лет назад

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

CVSS3: 4.9
nvd
больше 2 лет назад

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

CVSS3: 4.9
debian
больше 2 лет назад

Consul and Consul Enterprise allowed an authenticated user with servic ...

CVSS3: 6.5
redos
около 2 лет назад

Уязвимость Consul

EPSS

Процентиль: 52%
0.00287
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-476