CVE-2024-10005

Source
https://cve.org/CVERecord?id=CVE-2024-10005
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10005.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-10005
Aliases
Downstream
Related
Published
2024-10-30T22:15:02.820Z
Modified
2026-02-05T09:34:51.239716Z
Severity
  • 5.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.

References

Affected packages

Git / github.com/hashicorp/consul

Affected versions

api/v1.*
api/v1.0.0
api/v1.0.1
api/v1.1.0
api/v1.10.0
api/v1.2.0
api/v1.20.0
api/v1.21.0
api/v1.28.3
api/v1.4.0
ent-changelog-1.*
ent-changelog-1.15.11
ent-changelog-1.15.12
ent-changelog-1.15.13
ent-changelog-1.18.3
envoyextensions/v0.*
envoyextensions/v0.1.2
envoyextensions/v0.2.0
envoyextensions/v0.7.5
internal/v0.*
internal/v0.1.0
Other
list
proto-public/v0.*
proto-public/v0.1.0
proto-public/v0.1.1
proto-public/v0.6.1
proto-public/v0.6.2
sdk/v0.*
sdk/v0.1.0
sdk/v0.1.1
sdk/v0.13.1
sdk/v0.16.1
sdk/v0.2.0
sdk/v0.4.0
troubleshoot/v0.*
troubleshoot/v0.1.2
v1.*
v1.11.0-alpha
v1.15.11
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.6.0
v1.6.0-beta1
v1.6.0-beta2
v1.6.0-beta3
v1.6.0-rc1
v1.6.1
v1.7.0
v1.7.0-beta1
v1.7.0-beta2
v1.7.0-beta3
v1.9.0-beta1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-10005.json"