HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q6h7-4qgw-2j9p Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.85724}

epss

{'score': 0.86941}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:10:59.268Z

Reserved: 2022-04-13T00:00:00

Link: CVE-2022-29153

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-19T16:17:10.493

Modified: 2024-11-21T06:58:35.740

Link: CVE-2022-29153

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-04-19T00:00:00Z

Links: CVE-2022-29153 - Bugzilla

cve-icon OpenCVE Enrichment

No data.