Affected by GO-2022-0559
and 8 other vulnerabilities
GO-2022-0559: HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. in github.com/hashicorp/consul
GO-2022-0593: HashiCorp Consul Privilege Escalation Vulnerability in github.com/hashicorp/consul
GO-2022-0615: Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul
GO-2022-0953: HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers in github.com/hashicorp/consul
GO-2022-1029: HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul
GO-2023-1827: Hashicorp Consul vulnerable to denial of service in github.com/hashicorp/consul
GO-2024-3241: Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul
GO-2024-3242: Hashicorp Consul Cross-site Scripting vulnerability in github.com/hashicorp/consul
GO-2024-3243: Hashicorp Consul Path Traversal vulnerability in github.com/hashicorp/consul
WaitForActiveCARoot polls until the server returns an active Connect root CA
with the same ID field as expect. If expect is nil, it just waits until _any_
active root is returned. This is useful because initializing CA happens after
raft leadership is gained so WaitForLeader isn't sufficient to be sure that
the CA is fully initialized.
func WaitForServiceIntentions(t *testing.T, rpc rpcFn, dc string)
WaitForServiceIntentions waits until the server can accept config entry
kinds of service-intentions meaning any migration bootstrapping from pre-1.9
intentions has completed.