First published: Thu Jun 11 2020(Updated: )
HashiCorp Consul and Consul Enterprise failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers. Introduced in 1.4.0, fixed in 1.6.6 and 1.7.4.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/hashicorp/consul | >=1.7.0<1.7.4 | 1.7.4 |
go/github.com/hashicorp/consul | >=1.6.0<1.6.6 | 1.6.6 |
HashiCorp Consul | >=1.4.0<1.6.6 | |
HashiCorp Consul | >=1.4.0<=1.6.6 | |
HashiCorp Consul | >=1.7.0<1.7.4 | |
HashiCorp Consul | >=1.7.0<1.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12797 is a vulnerability in HashiCorp Consul and Consul Enterprise that failed to enforce changes to legacy ACL token rules due to non-propagation to secondary data centers.
CVE-2020-12797 has a severity of 5.3 (medium).
CVE-2020-12797 affects HashiCorp Consul and Consul Enterprise versions 1.4.0 to 1.7.4.
To fix CVE-2020-12797, upgrade to HashiCorp Consul or Consul Enterprise version 1.6.6 or 1.7.4.
More information about CVE-2020-12797 can be found in the NVD vulnerability details page and the HashiCorp Consul GitHub issues and pull request.