A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that using URL paths in L7 traffic intentions could bypass HTTP request path-based access rules.
{ "binaries": [ { "binary_name": "consul", "binary_version": "0.6.4~dfsg-3" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "0.6.4~dfsg-3" } ] }
{ "binaries": [ { "binary_name": "consul", "binary_version": "1.5.2+dfsg2-14" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "1.5.2+dfsg2-14" } ] }
{ "binaries": [ { "binary_name": "consul", "binary_version": "1.8.7+dfsg1-3" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "1.8.7+dfsg1-3" } ] }