Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2022-29153 — Server-Side Request Forgery in Hashicorp Consul
Severity
7.5HIGHNVD
EPSS
87.8%
top 0.53%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 19
Latest updateAug 21
Description
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
Also affects: Fedora 37
🔴Vulnerability Details
5OSV▶
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul↗2024-08-21
OSV▶
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector↗2022-04-20
GHSA▶
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector↗2022-04-20
💥Exploits & PoCs
1Nuclei▶
HashiCorp Consul/Consul Enterprise - Server-Side Request Forgery