Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-2816


Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.


Published

2023-06-02T23:15:09.503

Last Modified

2024-11-21T07:59:20.730

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.7 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-266
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application hashicorp consul < 1.15.3 Yes
Application hashicorp consul < 1.15.3 Yes

References