Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-40716

Опубликовано: 23 сент. 2022
Источник: redhat
CVSS3: 6.5

Описание

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."

A flaw was found in the HashiCorp Consul package. In the affected versions of this package, a specially crafted CSR sent directly to Consul’s internal server agent RPC endpoint can include multiple SAN URI values with additional service names.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-loki-rhel8Not affected
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/acm-grafana-rhel8Will not fix
Red Hat OpenShift Container Platform 4openshift4/ose-grafanaAffected
Red Hat OpenShift Container Platform 4openshift4/topology-aware-lifecycle-manager-rhel8-operatorAffected
Red Hat Openshift Data Foundation 4odf4/odf-multicluster-rhel9-operatorAffected
Red Hat Openshift Data Foundation 4odf4/odr-rhel8-operatorAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-252
https://bugzilla.redhat.com/show_bug.cgi?id=2156860consul: Consul Service Mesh Intention Bypass with Malicious Certificate Signing Request

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."

CVSS3: 6.5
nvd
больше 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."

CVSS3: 6.5
debian
больше 3 лет назад

HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13. ...

CVSS3: 6.5
github
больше 3 лет назад

HashiCorp Consul vulnerable to authorization bypass

CVSS3: 6.5
fstec
больше 3 лет назад

Уязвимость инструмента настройки сервисов Consul и Consul Enterprise, связанная с непроверенным возвращенным значением, позволяющая нарушителю обойти внедренные ограничения безопасности

6.5 Medium

CVSS3