First published: Thu Mar 09 2023(Updated: )
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service.
Credit: security@hashicorp.com security@hashicorp.com security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Consul | <1.14.5 | |
go/github.com/hashicorp/consul | >=1.14.0<1.14.5 | 1.14.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0845 is a vulnerability found in Consul and Consul Enterprise that allows an authenticated user with service:write permissions to trigger a workflow that causes Consul server and client agents to crash.
CVE-2023-0845 can crash Consul server and client agents when an authenticated user with service:write permissions triggers a certain workflow.
The severity of CVE-2023-0845 is rated as medium, with a CVSS score of 6.5.
Versions up to and including 1.14.5 of Consul and versions between 1.14.0 and 1.14.5 of the go package github.com/hashicorp/consul are affected by CVE-2023-0845.
To fix CVE-2023-0845, users should upgrade to a version of Consul and the go package github.com/hashicorp/consul that is higher than 1.14.5.