CVE-2022-29153

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*

History

21 Nov 2024, 06:58

Type Values Removed Values Added
References () https://discuss.hashicorp.com - Vendor Advisory () https://discuss.hashicorp.com - Vendor Advisory
References () https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/ - Vendor Advisory () https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/ - Vendor Advisory
References () https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393 - Vendor Advisory () https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393 - Vendor Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/ - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202208-09 - Third Party Advisory () https://security.gentoo.org/glsa/202208-09 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20220602-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20220602-0005/ - Third Party Advisory

23 Feb 2023, 20:17

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/', 'name': 'FEDORA-2022-7e327a20be', 'tags': [], 'refsource': 'FEDORA'}
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/ - Mailing List, Third Party Advisory

26 Dec 2022, 04:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/ -

19 Oct 2022, 15:09

Type Values Removed Values Added
References (MISC) https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/ - (MISC) https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/ - Vendor Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220602-0005/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220602-0005/ - Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202208-09 - (GENTOO) https://security.gentoo.org/glsa/202208-09 - Third Party Advisory

11 Aug 2022, 00:15

Type Values Removed Values Added
Summary HashiCorp Consul and Consul Enterprise through 2022-04-12 allow SSRF. HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
References
  • (MISC) https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/ -

10 Aug 2022, 20:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-09 -

02 Jun 2022, 20:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220602-0005/ -

27 Apr 2022, 16:34

Type Values Removed Values Added
CPE cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*
cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*
CWE CWE-918
References (MISC) https://discuss.hashicorp.com - (MISC) https://discuss.hashicorp.com - Vendor Advisory
References (MISC) https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393 - (MISC) https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5

19 Apr 2022, 17:41

Type Values Removed Values Added
New CVE

Information

Published : 2022-04-19 16:17

Updated : 2024-11-21 06:58


NVD link : CVE-2022-29153

Mitre link : CVE-2022-29153

CVE.ORG link : CVE-2022-29153


JSON object : View

Products Affected

fedoraproject

  • fedora

hashicorp

  • consul
CWE
CWE-918

Server-Side Request Forgery (SSRF)