Lucene search

K
HashicorpConsul

8 matches found

CVE
CVE
added 2021/01/11 6:15 a.m.607 views

CVE-2021-3121

An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.

8.6CVSS8.2AI score0.00101EPSS
CVE
CVE
added 2021/09/07 12:15 p.m.295 views

CVE-2021-37219

HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

8.8CVSS8.4AI score0.01719EPSS
CVE
CVE
added 2024/10/30 10:15 p.m.88 views

CVE-2024-10005

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.

8.1CVSS6.6AI score0.00062EPSS
CVE
CVE
added 2023/12/04 7:15 a.m.78 views

CVE-2023-5332

Patch in third party library Consul requires 'enable-script-checks' to be set to False. This was required to enable a patch by the vendor. Without this setting the patch could be bypassed. This only affects GitLab-EE.

8.1CVSS6.5AI score0.0002EPSS
CVE
CVE
added 2021/12/12 5:15 a.m.75 views

CVE-2021-41805

HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.

8.8CVSS8.7AI score0.06555EPSS
Web
CVE
CVE
added 2023/06/02 11:15 p.m.58 views

CVE-2023-2816

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modi...

8.7CVSS7.2AI score0.00127EPSS
CVE
CVE
added 2024/10/30 10:15 p.m.54 views

CVE-2024-10006

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.

8.3CVSS6.6AI score0.00042EPSS
CVE
CVE
added 2019/03/05 11:29 p.m.42 views

CVE-2019-8336

HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "" as its secret is used in unusual circumstances.

8.1CVSS7.9AI score0.00408EPSS