Description
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
Published: 2022-04-19
Score: 7.5 High
EPSS: 87.8% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q6h7-4qgw-2j9p Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.85724}

epss

{'score': 0.86941}


Subscriptions

Fedoraproject Fedora
Hashicorp Consul
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:10:59.268Z

Reserved: 2022-04-13T00:00:00.000Z

Link: CVE-2022-29153

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-19T16:17:10.493

Modified: 2024-11-21T06:58:35.740

Link: CVE-2022-29153

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-04-19T00:00:00Z

Links: CVE-2022-29153 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses