HashiCorp Consul Enterprise version 1.8.0 up to 1.9.4 audit log can be bypassed by specifically crafted HTTP events. Fixed in 1.9.5, and 1.8.10.
References
Link | Resource |
---|---|
https://discuss.hashicorp.com/t/hcsec-2021-08-consul-enterprise-audit-log-bypass-for-http-events/23369 | Vendor Advisory |
https://security.gentoo.org/glsa/202208-09 | Third Party Advisory |
https://www.hashicorp.com/blog/category/consul | Vendor Advisory |
https://discuss.hashicorp.com/t/hcsec-2021-08-consul-enterprise-audit-log-bypass-for-http-events/23369 | Vendor Advisory |
https://security.gentoo.org/glsa/202208-09 | Third Party Advisory |
https://www.hashicorp.com/blog/category/consul | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.hashicorp.com/t/hcsec-2021-08-consul-enterprise-audit-log-bypass-for-http-events/23369 - Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202208-09 - Third Party Advisory | |
References | () https://www.hashicorp.com/blog/category/consul - Vendor Advisory |
Information
Published : 2021-04-20 16:15
Updated : 2024-11-21 05:59
NVD link : CVE-2021-28156
Mitre link : CVE-2021-28156
CVE.ORG link : CVE-2021-28156
JSON object : View
Products Affected
hashicorp
- consul
CWE