Access Control Bypass Affecting github.com/hashicorp/consul/api package, versions >=1.9.0 <1.20.1
Threat Intelligence
EPSS
0.05% (19th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMHASHICORPCONSULAPI-8310963
- published 31 Oct 2024
- disclosed 29 Oct 2024
- credit Unknown
Introduced: 29 Oct 2024
New CVE-2024-10006 Open this link in a new tabHow to fix?
Upgrade github.com/hashicorp/consul/api
to version 1.20.1 or higher.
Overview
Affected versions of this package are vulnerable to Access Control Bypass due to a lack of header normalization while using Headers in L7 traffic intentions. By exploiting this, an attacker could bypass HTTP header based access rules.