Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.7 |
| References | () https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 - Vendor Advisory |
26 Sep 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-266 |
12 Jun 2023, 16:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:* cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CWE | NVD-CWE-noinfo | |
| References | (MISC) https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 - Vendor Advisory |
02 Jun 2023, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-06-02 23:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2816
Mitre link : CVE-2023-2816
CVE.ORG link : CVE-2023-2816
JSON object : View
Products Affected
hashicorp
- consul
CWE
