CVE-2020-28053

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28053
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28053.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-28053
Aliases
Related
Published
2020-11-23T14:15:12Z
Modified
2025-02-19T03:10:30.348073Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

HashiCorp Consul and Consul Enterprise 1.2.0 up to 1.8.5 allowed operators with operator:read ACL permissions to read the Connect CA private key configuration. Fixed in 1.6.10, 1.7.10, and 1.8.6.

References

Affected packages

Debian:11 / consul

Package

Name
consul
Purl
pkg:deb/debian/consul?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.6+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/hashicorp/consul

Affected ranges

Type
GIT
Repo
https://github.com/hashicorp/consul
Events

Affected versions

api/v1.*

api/v1.0.0
api/v1.0.1
api/v1.1.0
api/v1.2.0

internal/v0.*

internal/v0.1.0

sdk/v0.*

sdk/v0.1.0
sdk/v0.1.1
sdk/v0.2.0
sdk/v0.3.0

v1.*

v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.4.0
v1.4.0-rc1
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.6.0
v1.6.0-beta1
v1.6.0-beta2
v1.6.0-beta3
v1.6.0-rc1
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.6.5
v1.6.6
v1.6.8
v1.6.9