Vulnerability Report: GO-2023-1828
- CVE-2023-2816, GHSA-rqjq-ww83-wv5c
- Affects: github.com/hashicorp/consul
- Published: Aug 20, 2024
- Unreviewed
Hashicorp Consul allows user with service:write permissions to patch remote proxy instances in github.com/hashicorp/consul
For detailed information about this vulnerability, visit https://github.com/advisories/GHSA-rqjq-ww83-wv5c or https://nvd.nist.gov/vuln/detail/CVE-2023-2816.
Affected Modules
-
PathGo Versions
-
from v1.15.0 before v1.15.3
Aliases
References
- https://github.com/advisories/GHSA-rqjq-ww83-wv5c
- https://nvd.nist.gov/vuln/detail/CVE-2023-2816
- https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525
- https://vuln.go.dev/ID/GO-2023-1828.json
Feedback
This report is unreviewed. It was automatically generated from a third-party source and its details have not been verified by the Go team.
See anything missing or incorrect?
Suggest an edit to this report.