First published: Tue Apr 19 2022(Updated: )
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | <1.9.17 | |
HashiCorp Consul | <1.9.17 | |
HashiCorp Consul | >=1.10.0<1.10.10 | |
HashiCorp Consul | >=1.10.0<1.10.10 | |
HashiCorp Consul | >=1.11.0<1.11.5 | |
HashiCorp Consul | >=1.11.0<1.11.5 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29153 is a vulnerability in HashiCorp Consul and Consul Enterprise up to versions 1.9.16, 1.10.9, and 1.11.4 that may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints.
CVE-2022-29153 is considered high severity with a CVSS score of 7.5.
To fix CVE-2022-29153, it is recommended to upgrade to the patched versions: 1.9.17, 1.10.10, or 1.11.5, depending on the version you are using.
Yes, HashiCorp Consul and Consul Enterprise versions up to 1.9.16, 1.10.9, and 1.11.4 are affected by CVE-2022-29153.
More information about CVE-2022-29153 can be found on the official HashiCorp forum: [link](https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393)