HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances.
References
Link | Resource |
---|---|
https://github.com/hashicorp/consul/issues/5423 | Mitigation Third Party Advisory |
https://github.com/hashicorp/consul/issues/5423 | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/hashicorp/consul/issues/5423 - Mitigation, Third Party Advisory |
Information
Published : 2019-03-05 23:29
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8336
Mitre link : CVE-2019-8336
CVE.ORG link : CVE-2019-8336
JSON object : View
Products Affected
hashicorp
- consul
CWE