Consul Envoy Extension Downsteam Proxy Configuration By Upstream Service Owner

CVE-2023-2816
8.7HIGH

Key Information

Vendor
Hashicorp
Status
Consul
Consul Enterprise
Vendor
CVE Published:
2 June 2023

Summary

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.

Affected Version(s)

Consul = 1.15.0

Consul = 1.15.1

Consul = 1.15.2

CVSS V3.1

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Risk change from: 6.5 to: 8.7 - (HIGH)

  • Risk change from: 6.5 to: 8.7 - (HIGH)

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database
.