golang / vulndb

[mirror] The Go Vulnerability Database
Other
564 stars 61 forks source link

x/vulndb: potential Go vuln in github.com/hashicorp/consul: GHSA-5c4w-8hhh-3c3h #3241

Closed GoVulnBot closed 3 weeks ago

GoVulnBot commented 3 weeks ago

Advisory GHSA-5c4w-8hhh-3c3h references a vulnerability in the following Go modules:

Module
github.com/hashicorp/consul

Description: A vulnerability was identified in Consul and Consul Enterprise ("Consul") such that using Headers in L7 traffic intentions could bypass HTTP header based access rules.

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/hashicorp/consul
      versions:
        - introduced: 1.9.0
        - fixed: 1.20.1
      vulnerable_at: 1.20.0
summary: |-
    Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax
    vulnerability in github.com/hashicorp/consul
cves:
    - CVE-2024-10006
ghsas:
    - GHSA-5c4w-8hhh-3c3h
references:
    - advisory: https://github.com/advisories/GHSA-5c4w-8hhh-3c3h
    - advisory: https://nvd.nist.gov/vuln/detail/CVE-2024-10006
    - fix: https://github.com/hashicorp/consul/commit/d9206fc7e284a9244af4d62f8653a63ca30bd00c
    - fix: https://github.com/hashicorp/consul/pull/21816
    - web: https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass
source:
    id: GHSA-5c4w-8hhh-3c3h
    created: 2024-10-31T15:01:20.47565472Z
review_status: UNREVIEWED
gopherbot commented 3 weeks ago

Change https://go.dev/cl/623640 mentions this issue: data/reports: add 9 unreviewed reports