ghsa-m69r-9g56-7mv8
Vulnerability from github
Published
2022-09-25 00:00
Modified
2023-09-06 18:54
Severity ?
Summary
HashiCorp Consul vulnerable to authorization bypass
Details
HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoint can include multiple SAN URI values with additional service names. This issue has been fixed in versions 1.11.9, 1.12.5, and 1.13.2. There are no known workarounds.
{ "affected": [ { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/consul" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.11.9" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/consul" }, "ranges": [ { "events": [ { "introduced": "1.12.0" }, { "fixed": "1.12.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/hashicorp/consul" }, "ranges": [ { "events": [ { "introduced": "1.13.0" }, { "fixed": "1.13.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-40716" ], "database_specific": { "cwe_ids": [ "CWE-252" ], "github_reviewed": true, "github_reviewed_at": "2022-09-29T14:39:58Z", "nvd_published_at": "2022-09-23T12:15:00Z", "severity": "MODERATE" }, "details": "HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul\u2019s internal server agent RPC endpoint can include multiple SAN URI values with additional service names. This issue has been fixed in versions 1.11.9, 1.12.5, and 1.13.2. There are no known workarounds.", "id": "GHSA-m69r-9g56-7mv8", "modified": "2023-09-06T18:54:15Z", "published": "2022-09-25T00:00:27Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40716" }, { "type": "WEB", "url": "https://github.com/hashicorp/consul/pull/14579" }, { "type": "WEB", "url": "https://github.com/hashicorp/consul/commit/8f6fb4f6fe9488b8ec37da71ac503081d7d3760b" }, { "type": "WEB", "url": "https://discuss.hashicorp.com" }, { "type": "WEB", "url": "https://discuss.hashicorp.com/t/hcsec-2022-20-consul-service-mesh-intention-bypass-with-malicious-certificate-signing-request/44628" }, { "type": "PACKAGE", "url": "https://github.com/hashicorp/consul" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ], "summary": "HashiCorp Consul vulnerable to authorization bypass" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.