nuclei-templates/cves/2022/CVE-2022-29153.yaml

51 lines
1.6 KiB
YAML
Raw Normal View History

id: CVE-2022-29153
info:
2023-01-08 15:43:00 +00:00
name: HashiCorp Consul/Enterprise - Server Side Request Forgery
author: c-sh0
severity: high
2023-01-08 15:43:00 +00:00
description: |
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Consul follows HTTP redirects by default. HTTP + Interval health check configuration now provides a disable_redirects option to prohibit this behavior.
reference:
- https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393
- https://github.com/hashicorp/consul/pull/12685
- https://developer.hashicorp.com/consul/docs/discovery/checks
2023-01-08 15:43:00 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-29153
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
cvss-score: 7.5
cve-id: CVE-2022-29153
cwe-id: CWE-918
2023-01-08 15:43:00 +00:00
metadata:
shodan-query: title:"Consul by HashiCorp"
verified: "true"
2023-01-08 15:43:00 +00:00
tags: cve,cve2022,consul,hashicorp,ssrf
requests:
- raw:
- |
2023-01-08 15:43:00 +00:00
PUT /v1/agent/check/register HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{
"id": "{{randstr}}",
"name": "{{randstr}}",
"method": "GET",
"http": "/dev/null",
"interval": "10s",
"timeout": "1s",
"disable_redirects": true
}
matchers-condition: and
matchers:
- type: word
part: body
words:
2023-01-08 15:43:00 +00:00
- unknown field "disable_redirects"
- type: status
status:
- 400