CVE-2021-38698:
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic.
6.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
9/8/2021
Updated
1/30/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/hashicorp/consul | go | = 1.10.1 | 1.10.2 |
github.com/hashicorp/consul | go | >= 1.9.0, < 1.9.9 | 1.9.9 |
github.com/hashicorp/consul | go | < 1.8.15 | 1.8.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing authorization checks in the Txn.Apply endpoint when handling proxy registrations. The linked PR #10824 shows fixes in proxycfg manager's token handling (ServiceToken function) where the default ACL token wasn't properly utilized when no service token was provided. This allowed services with any service:write permission to register proxies for unauthorized services. The Txn endpoint processing in txn_endpoint.go would execute these unauthorized operations due to the missing token validation.