nuclei-templates/cves/2022/CVE-2022-29153.yaml

50 lines
1.5 KiB
YAML
Raw Normal View History

id: CVE-2022-29153
info:
name: HashiCorp Consul / Enterprise - Server Side Request Forgery
author: c-sh0
severity: high
description: HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and
1.11.4 may allow server side request forgery when the Consul client agent
follows redirects returned by HTTP health check endpoints. Consul follows
HTTP redirects by default. HTTP + Interval health check configuration now
provides a disable_redirects option to prohibit this behavior.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2022-29153
- https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
- https://github.com/hashicorp/consul/pull/12685
- https://developer.hashicorp.com/consul/docs/discovery/checks
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
cvss-score: 7.5
cve-id: CVE-2022-29153
cwe-id: CWE-918
tags: cve,cve2022,consul,ssrf,hashicorp
requests:
- raw:
- |
PUT {{BaseURL}}/v1/agent/check/register HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{
"id": "{{randstr}}",
"name": "{{randstr}}",
"method": "GET",
"http": "/dev/null",
"interval": "10s",
"timeout": "1s",
"disable_redirects": true
}
matchers-condition: and
matchers:
- type: status
status:
- 400
- type: word
part: body
words:
- unknown field "disable_redirects"