Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-37219

Опубликовано: 26 авг. 2021
Источник: redhat
CVSS3: 8.8

Описание

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

A flaw in Consul Raft RPC layer allows privilege escalation by allowing access to access server-only functionality from non-server agents with a valid certificate signed by the same CA.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 1consulNot affected
OpenShift Service Mesh 2.0consulNot affected
Red Hat Advanced Cluster Management for Kubernetes 2consulNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=2008169consul: RPC layer allows non-server agents to access server-only functionality

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 4 лет назад

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

CVSS3: 8.8
nvd
больше 4 лет назад

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

CVSS3: 8.8
debian
больше 4 лет назад

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows no ...

CVSS3: 8.8
github
больше 4 лет назад

HashiCorp Consul Privilege Escalation Vulnerability

8.8 High

CVSS3