CVE-2022-29153

HIGH EXPLOITED NUCLEI

HashiCorp Consul <1.9.16-1.11.4 - SSRF

Title source: llm

Description

HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.

Nuclei Templates (1)

HashiCorp Consul/Consul Enterprise - Server-Side Request Forgery
HIGHVERIFIEDby c-sh0
Shodan: title:"Consul by HashiCorp" || http.title:"consul by hashicorp" || cpe:"cpe:2.3:a:hashicorp:consul"
FOFA: title="consul by hashicorp"

Scores

CVSS v3 7.5
EPSS 0.8776
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Details

VulnCheck KEV 2023-11-13
CWE
CWE-918
Status published
Products (3)
fedoraproject/fedora 37
hashicorp/consul < 1.9.17 (2 CPE variants)
hashicorp/consul 0 - 1.9.17Go
Published Apr 19, 2022
Tracked Since Feb 18, 2026