Skip to content

Commit d974909

Browse files
committed
data/reports: add GO-2024-2683.yaml
Aliases: CVE-2021-41803, GHSA-hr3v-8cp3-68rf Fixes #2683 Change-Id: I1bf780189f73f699ee11deff3f0d25e94a963d22 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/576875 LUCI-TryBot-Result: Go LUCI <[email protected]> Run-TryBot: Zvonimir Pavlinovic <[email protected]> TryBot-Result: Gopher Robot <[email protected]> Reviewed-by: Tatiana Bradley <[email protected]>
1 parent 6651075 commit d974909

File tree

2 files changed

+108
-0
lines changed

2 files changed

+108
-0
lines changed

data/osv/GO-2024-2683.json

+74
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,74 @@
1+
{
2+
"schema_version": "1.3.1",
3+
"id": "GO-2024-2683",
4+
"modified": "0001-01-01T00:00:00Z",
5+
"published": "0001-01-01T00:00:00Z",
6+
"aliases": [
7+
"CVE-2021-41803",
8+
"GHSA-hr3v-8cp3-68rf"
9+
],
10+
"summary": "Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul",
11+
"details": "HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC.",
12+
"affected": [
13+
{
14+
"package": {
15+
"name": "github.com/hashicorp/consul",
16+
"ecosystem": "Go"
17+
},
18+
"ranges": [
19+
{
20+
"type": "SEMVER",
21+
"events": [
22+
{
23+
"introduced": "1.8.1"
24+
},
25+
{
26+
"fixed": "1.11.9"
27+
},
28+
{
29+
"introduced": "1.12.0"
30+
},
31+
{
32+
"fixed": "1.12.5"
33+
},
34+
{
35+
"introduced": "1.13.0"
36+
},
37+
{
38+
"fixed": "1.13.2"
39+
}
40+
]
41+
}
42+
],
43+
"ecosystem_specific": {
44+
"imports": [
45+
{
46+
"path": "github.com/hashicorp/consul/agent/consul",
47+
"symbols": [
48+
"AutoConfig.InitialConfiguration",
49+
"jwtAuthorizer.Authorize"
50+
]
51+
}
52+
]
53+
}
54+
}
55+
],
56+
"references": [
57+
{
58+
"type": "WEB",
59+
"url": "https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627"
60+
},
61+
{
62+
"type": "FIX",
63+
"url": "https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee"
64+
}
65+
],
66+
"credits": [
67+
{
68+
"name": "anonymous4ACL24"
69+
}
70+
],
71+
"database_specific": {
72+
"url": "https://pkg.go.dev/vuln/GO-2024-2683"
73+
}
74+
}

data/reports/GO-2024-2683.yaml

+34
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
id: GO-2024-2683
2+
modules:
3+
- module: github.com/hashicorp/consul
4+
versions:
5+
- introduced: 1.8.1
6+
fixed: 1.11.9
7+
- introduced: 1.12.0
8+
fixed: 1.12.5
9+
- introduced: 1.13.0
10+
fixed: 1.13.2
11+
vulnerable_at: 1.13.1
12+
packages:
13+
- package: github.com/hashicorp/consul/agent/consul
14+
symbols:
15+
- jwtAuthorizer.Authorize
16+
derived_symbols:
17+
- AutoConfig.InitialConfiguration
18+
summary: |-
19+
Improper handling of node names in JWT claims assertions in
20+
github.com/hashicorp/consul
21+
description: |-
22+
HashiCorp Consul does not properly validate the node or segment names prior to
23+
interpolation and usage in JWT claim assertions with the auto config RPC.
24+
cves:
25+
- CVE-2021-41803
26+
ghsas:
27+
- GHSA-hr3v-8cp3-68rf
28+
credits:
29+
- anonymous4ACL24
30+
references:
31+
- web: https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627
32+
- fix: https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee
33+
notes:
34+
- create: found alias BIT-consul-2021-41803 that is not a GHSA or CVE

0 commit comments

Comments
 (0)