CVE-2023-2816 The advisory has been revoked - it doesn't affect any version of package consul  (opens in a new tab)


Threat Intelligence

EPSS
0.05% (22nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-CONSUL-5670904
  • published8 Jun 2023
  • disclosed2 Jun 2023

Introduced: 2 Jun 2023

CVE-2023-2816  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream consul package and not the consul package as distributed by Debian.

Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.