Description
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q6h7-4qgw-2j9p | Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T06:10:59.268Z
Reserved: 2022-04-13T00:00:00.000Z
Link: CVE-2022-29153
No data.
Status : Modified
Published: 2022-04-19T16:17:10.493
Modified: 2024-11-21T06:58:35.740
Link: CVE-2022-29153
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA