CVE-2022-29153
HIGH EXPLOITED NUCLEIHashiCorp Consul <1.9.16-1.11.4 - SSRF
Title source: llmDescription
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
Nuclei Templates (1)
HashiCorp Consul/Consul Enterprise - Server-Side Request Forgery
HIGHVERIFIEDby c-sh0
Shodan:
title:"Consul by HashiCorp" || http.title:"consul by hashicorp" || cpe:"cpe:2.3:a:hashicorp:consul"
FOFA:
title="consul by hashicorp"
References (6)
Scores
CVSS v3
7.5
EPSS
0.8776
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Details
VulnCheck KEV
2023-11-13
CWE
CWE-918
Status
published
Products (3)
fedoraproject/fedora
37
hashicorp/consul
< 1.9.17 (2 CPE variants)
hashicorp/consul
0 - 1.9.17Go
Published
Apr 19, 2022
Tracked Since
Feb 18, 2026