Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-29153

Опубликовано: 19 апр. 2022
Источник: redhat
CVSS3: 7.5
EPSS Высокий

Описание

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

A flaw was found in the Consul and Consul Enterprise (“Consul”) where HTTP health check endpoints return an HTTP redirect, which can be abused as a vector for server-side request forgery (SSRF).

Отчет

This vulnerability arises due to the HashiCorp Consul Client agent which is not used in Red Hat products. Hence, we categorized this CVE as Moderate impact.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Will not fix
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/cluster-curator-controller-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/managedcluster-import-controller-rhel8Not affected
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaNot affected
Red Hat OpenShift Container Platform 4openshift4/topology-aware-lifecycle-manager-rhel8-operatorAffected
Red Hat OpenShift Container Platform 4openshift4/topology-aware-lifecycle-operator-precache-rhel8Affected
Red Hat Openshift Data Foundation 4odf4/odf-multicluster-rhel9-operatorAffected
Red Hat Openshift Data Foundation 4odf4/odr-rhel8-operatorAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=2134570consul: Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector

EPSS

Процентиль: 99%
0.87417
Высокий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

CVSS3: 7.5
nvd
около 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

CVSS3: 7.5
debian
около 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11. ...

CVSS3: 7.5
github
около 3 лет назад

Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector

CVSS3: 7.5
fstec
около 3 лет назад

Уязвимость инструмента настройки сервисов Consul и Consul Enterprise, связанная с недостаточной проверкой запросов на стороне сервера, позволяющая нарушителю осуществить атаку SSRF

EPSS

Процентиль: 99%
0.87417
Высокий

7.5 High

CVSS3