Bug 2008169 (CVE-2021-37219) - CVE-2021-37219 consul: RPC layer allows non-server agents to access server-only functionality
Summary: CVE-2021-37219 consul: RPC layer allows non-server agents to access server-on...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2021-37219
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2008172
TreeView+ depends on / blocked
 
Reported: 2021-09-27 13:40 UTC by Pedro Sampaio
Modified: 2021-10-12 14:08 UTC (History)
21 users (show)

Fixed In Version: consul 1.8.15, consul 1.9.9, consul 1.10.2
Doc Type: If docs needed, set a value
Doc Text:
A flaw in Consul Raft RPC layer allows privilege escalation by allowing access to access server-only functionality from non-server agents with a valid certificate signed by the same CA.
Clone Of:
Environment:
Last Closed: 2021-10-12 14:08:18 UTC


Attachments (Terms of Use)

Description Pedro Sampaio 2021-09-27 13:40:32 UTC
HashiCorp Consul and Consul Enterprise 1.10.1 Raft RPC layer allows non-server agents with a valid certificate signed by the same CA to access server-only functionality, enabling privilege escalation. Fixed in 1.8.15, 1.9.9 and 1.10.2.

References:

https://discuss.hashicorp.com/t/hcsec-2021-22-consul-raft-rpc-privilege-escalation/29024
https://www.hashicorp.com/blog/category/consul
https://github.com/hashicorp/consul/pull/10925
https://github.com/hashicorp/consul/pull/10931

Comment 1 Product Security DevOps Team 2021-10-12 14:08:18 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-37219


Note You need to log in before you can comment on or make changes to this bug.