GO-2024-2683

Source
https://pkg.go.dev/vuln/GO-2024-2683
Import Source
https://vuln.go.dev/ID/GO-2024-2683.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2024-2683
Aliases
Published
2024-04-05T16:54:12Z
Modified
2024-05-20T16:03:47Z
Summary
Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul
Details

HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2024-2683"
}
References
Credits
    • anonymous4ACL24

Affected packages

Go / github.com/hashicorp/consul

Package

Name
github.com/hashicorp/consul
View open source insights on deps.dev
Purl
pkg:golang/github.com/hashicorp/consul

Affected ranges

Type
SEMVER
Events
Introduced
1.8.1
Fixed
1.11.9
Introduced
1.12.0
Fixed
1.12.5
Introduced
1.13.0
Fixed
1.13.2

Ecosystem specific

{
    "imports": [
        {
            "path": "github.com/hashicorp/consul/agent/consul",
            "symbols": [
                "AutoConfig.InitialConfiguration",
                "jwtAuthorizer.Authorize"
            ]
        }
    ]
}