Consul Envoy Extension Downsteam Proxy Configuration By Upstream Service Owner
CVE-2023-2816
8.7HIGH
Summary
Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
Affected Version(s)
Consul = 1.15.0
Consul = 1.15.1
Consul = 1.15.2
CVSS V3.1
Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Risk change from: 6.5 to: 8.7 - (HIGH)
Risk change from: 6.5 to: 8.7 - (HIGH)
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database