HashiCorp Consul vulnerable to authorization bypass
Moderate severity
GitHub Reviewed
Published
Sep 25, 2022
to the GitHub Advisory Database
•
Updated Sep 6, 2023
Package
Affected versions
< 1.11.9
>= 1.12.0, < 1.12.5
>= 1.13.0, < 1.13.2
Patched versions
1.11.9
1.12.5
1.13.2
Description
Published by the National Vulnerability Database
Sep 23, 2022
Published to the GitHub Advisory Database
Sep 25, 2022
Reviewed
Sep 29, 2022
Last updated
Sep 6, 2023
HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoint can include multiple SAN URI values with additional service names. This issue has been fixed in versions 1.11.9, 1.12.5, and 1.13.2. There are no known workarounds.
References