Bug 2156860 (CVE-2022-40716) - CVE-2022-40716 consul: Consul Service Mesh Intention Bypass with Malicious Certificate Signing Request
Summary: CVE-2022-40716 consul: Consul Service Mesh Intention Bypass with Malicious Ce...
Keywords:
Status: NEW
Alias: CVE-2022-40716
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2156861 2156862 2156863 2156864 2156866 2156867
Blocks: 2156865
TreeView+ depends on / blocked
 
Reported: 2022-12-29 03:54 UTC by Avinash Hanwate
Modified: 2025-03-17 23:44 UTC (History)
11 users (show)

Fixed In Version: consul 1.11.9, consul 1.12.5, consul 1.13.2
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2022-12-29 03:54:40 UTC
HashiCorp Consul and Consul Enterprise up to 1.11.8, 1.12.4, and 1.13.1 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. Fixed in 1.11.9, 1.12.5, and 1.13.2."

https://discuss.hashicorp.com/t/hcsec-2022-20-consul-service-mesh-intention-bypass-with-malicious-certificate-signing-request/44628
https://discuss.hashicorp.com

Comment 1 Avinash Hanwate 2022-12-29 03:55:29 UTC
Created golang-github-hashicorp-consul-api tracking bugs for this issue:

Affects: fedora-36 [bug 2156861]

Comment 2 Avinash Hanwate 2022-12-29 03:56:53 UTC
Created golang-github-hashicorp-consul-sdk tracking bugs for this issue:

Affects: fedora-36 [bug 2156862]


Created moby-engine tracking bugs for this issue:

Affects: fedora-36 [bug 2156863]
Affects: fedora-37 [bug 2156864]


Note You need to log in before you can comment on or make changes to this bug.