Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
References
Configurations
Configuration 1 (hide)
|
History
26 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-266 |
12 Jun 2023, 16:32
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:* cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 - Vendor Advisory |
02 Jun 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-02 23:15
Updated : 2024-09-26 19:15
NVD link : CVE-2023-2816
Mitre link : CVE-2023-2816
CVE.ORG link : CVE-2023-2816
JSON object : View
Products Affected
hashicorp
- consul
CWE