Skip to content

Hashicorp Consul vulnerable to denial of service

Moderate severity GitHub Reviewed Published Jun 3, 2023 to the GitHub Advisory Database • Updated Nov 11, 2023

Package

gomod github.com/hashicorp/consul (Go)

Affected versions

< 1.14.5
>= 1.15.0, < 1.15.3

Patched versions

1.14.5
1.15.3

Description

Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3

References

Published by the National Vulnerability Database Jun 2, 2023
Published to the GitHub Advisory Database Jun 3, 2023
Reviewed Jun 6, 2023
Last updated Nov 11, 2023

Severity

Moderate
4.9
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
High
User interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

Weaknesses

CVE ID

CVE-2023-1297

GHSA ID

GHSA-c57c-7hrj-6q6v

Source code

Checking history
See something to contribute? Suggest improvements for this vulnerability.