Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/hashicorp/consul: GHSA-99wr-c2px-grmh #3242

Closed
GoVulnBot opened this issue Oct 31, 2024 · 1 comment
Labels

Comments

@GoVulnBot
Copy link

Advisory GHSA-99wr-c2px-grmh references a vulnerability in the following Go modules:

Module
github.com/hashicorp/consul

Description:
A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/hashicorp/consul
      versions:
        - introduced: 1.4.1
        - fixed: 1.20.0
      vulnerable_at: 1.20.0-rc1
summary: Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
cves:
    - CVE-2024-10086
ghsas:
    - GHSA-99wr-c2px-grmh
references:
    - advisory: https://github.com/advisories/GHSA-99wr-c2px-grmh
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-10086
    - fix: https://github.com/hashicorp/consul/commit/07fae7bb0be8593cc98c38b1ef4a49ed9188932f
    - web: https://discuss.hashicorp.com/t/hcsec-2024-24-consul-vulnerable-to-reflected-xss-on-content-type-error-manipulation
source:
    id: GHSA-99wr-c2px-grmh
    created: 2024-10-31T15:01:21.22930686Z
review_status: UNREVIEWED

@gopherbot
Copy link
Contributor

Change https://go.dev/cl/623640 mentions this issue: data/reports: add 9 unreviewed reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants