Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.7 |
26 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-266 |
12 Jun 2023, 16:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 - Vendor Advisory | |
CPE | cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:* cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:* |
|
First Time |
Hashicorp
Hashicorp consul |
02 Jun 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-02 23:15
Updated : 2024-11-21 07:59
NVD link : CVE-2023-2816
Mitre link : CVE-2023-2816
CVE.ORG link : CVE-2023-2816
JSON object : View
Products Affected
hashicorp
- consul
CWE