First published: Tue Apr 20 2021(Updated: )
HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | <1.7.14 | |
HashiCorp Consul | <1.7.14 | |
HashiCorp Consul | >=1.8.0<1.8.10 | |
HashiCorp Consul | >=1.8.0<1.8.10 | |
HashiCorp Consul | >=1.9.0<1.9.5 | |
HashiCorp Consul | >=1.9.0<1.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-25864.
The severity of CVE-2020-25864 is medium with a CVSS score of 6.1.
HashiCorp Consul and Consul Enterprise versions up to 1.9.4 are affected by CVE-2020-25864.
You can fix CVE-2020-25864 by updating to version 1.9.5, 1.8.10, or 1.7.14 of HashiCorp Consul or Consul Enterprise.
You can find more information about CVE-2020-25864 at the following references: [Link 1](https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368), [Link 2](https://security.gentoo.org/glsa/202208-09), [Link 3](https://www.hashicorp.com/blog/category/consul).