CVE-2020-7955:
Incorrect Authorization in HashiCorp Consul
5.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55478%
CWE
Published
7/28/2021
Updated
2/1/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/hashicorp/consul | go | >= 1.4.1, <= 1.6.2 | 1.6.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The security patch adds ACL token parsing and authorization checks to both AgentHealthServiceByID
and AgentHealthServiceByName
methods in agent_endpoint.go
. The commit message explicitly states these endpoints were missing ACL enforcement. The vulnerable functions are the HTTP
handler methods that process
/v1/agent/health/service/id/{id}
and /v1/agent/health/service/name/{name}
endpoints. In vulnerable versions, these functions would appear in runtime profiles when handling unauthorized requests to these endpoints as they processed sensitive health checks without proper authorization.