{"id":"GO-2022-0615","summary":"Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul","details":"Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector in github.com/hashicorp/consul","aliases":["BIT-consul-2022-29153","CVE-2022-29153","GHSA-q6h7-4qgw-2j9p"],"modified":"2026-02-04T03:41:28.299846Z","published":"2024-08-21T15:11:40Z","related":["CGA-4h83-9wqq-cc36"],"database_specific":{"url":"https://pkg.go.dev/vuln/GO-2022-0615","review_status":"UNREVIEWED"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-q6h7-4qgw-2j9p"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29153"},{"type":"WEB","url":"https://discuss.hashicorp.com"},{"type":"WEB","url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery"},{"type":"WEB","url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202208-09"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20220602-0005"}],"affected":[{"package":{"name":"github.com/hashicorp/consul","ecosystem":"Go","purl":"pkg:golang/github.com/hashicorp/consul"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.9.17"},{"introduced":"1.10.0"},{"fixed":"1.10.10"},{"introduced":"1.11.0"},{"fixed":"1.11.5"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0615.json"}}],"schema_version":"1.7.3"}