Consul Server Panic when Ingress and API Gateways Configured with Peering Connections
Moderate severity
GitHub Reviewed
Published
Mar 9, 2023
to the GitHub Advisory Database
•
Updated Sep 20, 2023
Package
Affected versions
>= 1.14.0, < 1.14.5
Patched versions
1.14.5
Description
Published by the National Vulnerability Database
Mar 9, 2023
Published to the GitHub Advisory Database
Mar 9, 2023
Reviewed
Mar 16, 2023
Last updated
Sep 20, 2023
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) an authenticated user with service:write permissions could trigger a workflow that causes Consul server and client agents to crash under certain circumstances. To exploit this vulnerability, an attacker requires access to an ACL token with service:write permissions, and there needs to be at least one running ingress or API gateway that is configured to route traffic to an upstream service.
References