Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1879 | Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies. |
Github GHSA |
GHSA-rqjq-ww83-wv5c | Hashicorp Consul allows user with service:write permissions to patch remote proxy instances |
Mon, 07 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Thu, 26 Sep 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 |
Thu, 26 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hashicorp:consul:1.15.0:*:*:*:-:*:*:* cpe:2.3:a:hashicorp:consul:1.15.0:*:*:*:enterprise:*:*:* |
|
| Metrics |
ssvc
|
Thu, 26 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-266 |
Status: PUBLISHED
Assigner: HashiCorp
Published:
Updated: 2024-10-07T20:12:01.627Z
Reserved: 2023-05-19T18:11:06.618Z
Link: CVE-2023-2816
Updated: 2024-08-02T06:33:05.672Z
Status : Modified
Published: 2023-06-02T23:15:09.503
Modified: 2024-11-21T07:59:20.730
Link: CVE-2023-2816
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA