Lucene search

K

Consul Security Vulnerabilities - 2023

cve
cve

CVE-2023-0845

Consul and Consul Enterprise allowed an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash under certain circumstances. This vulnerability was fixed in Consul 1.14.5.

6.5CVSS

6.2AI Score

0.001EPSS

2023-03-09 04:15 PM
164
cve
cve

CVE-2023-1297

Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3

7.5CVSS

7.1AI Score

0.001EPSS

2023-06-02 11:15 PM
147
cve
cve

CVE-2023-2816

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modi...

8.7CVSS

6.5AI Score

0.0005EPSS

2023-06-02 11:15 PM
41
cve
cve

CVE-2023-3518

HashiCorp Consul and Consul Enterprise 1.16.0 when using JWT Auth for service mesh incorrectly allows/denies access regardless of service identities. Fixed in 1.16.1.

7.4CVSS

7AI Score

0.001EPSS

2023-08-09 04:15 PM
2585
cve
cve

CVE-2023-5332

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

8.1CVSS

7.7AI Score

0.001EPSS

2023-12-04 07:15 AM
49