GHSA-m69r-9g56-7mv8

Source
https://github.com/advisories/GHSA-m69r-9g56-7mv8
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/09/GHSA-m69r-9g56-7mv8/GHSA-m69r-9g56-7mv8.json
Aliases
Published
2022-09-25T00:00:27Z
Modified
2023-12-06T01:02:34.822434Z
Details

HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoint can include multiple SAN URI values with additional service names. This issue has been fixed in versions 1.11.9, 1.12.5, and 1.13.2. There are no known workarounds.

References

Affected packages

Go / github.com/hashicorp/consul

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.11.9

Go / github.com/hashicorp/consul

Affected ranges

Type
SEMVER
Events
Introduced
1.12.0
Fixed
1.12.5

Go / github.com/hashicorp/consul

Affected ranges

Type
SEMVER
Events
Introduced
1.13.0
Fixed
1.13.2