First published: Fri Sep 23 2022(Updated: )
HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 did not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | >=1.8.1<1.11.9 | |
HashiCorp Consul | >=1.8.1<1.11.9 | |
HashiCorp Consul | =1.12.4 | |
HashiCorp Consul | =1.12.4 | |
HashiCorp Consul | =1.13.1 | |
HashiCorp Consul | =1.13.1 | |
go/github.com/hashicorp/consul | >=1.13.0<1.13.2 | 1.13.2 |
go/github.com/hashicorp/consul | >=1.12.0<1.12.5 | 1.12.5 |
go/github.com/hashicorp/consul | >=1.8.1<1.11.9 | 1.11.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this HashiCorp Consul vulnerability is CVE-2021-41803.
The severity of CVE-2021-41803 is high with a severity value of 7.1.
HashiCorp Consul versions 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 are affected by CVE-2021-41803.
You can fix CVE-2021-41803 by updating your HashiCorp Consul installation to version 1.11.9, 1.12.5, or 1.13.2.
You can find more information about CVE-2021-41803 at the following references: [1](https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627), [2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC/), [3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XNF4OLYZRQE75EB5TW5N42FSXHBXGWFE/).