{"id":"GO-2024-3241","summary":"Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul","details":"Hashicorp Consul Improper Neutralization of HTTP Headers for Scripting Syntax vulnerability in github.com/hashicorp/consul","aliases":["BIT-consul-2024-10006","CVE-2024-10006","GHSA-5c4w-8hhh-3c3h"],"modified":"2026-02-04T02:46:22.816688Z","published":"2024-11-04T15:44:16Z","related":["CGA-pcg4-47ff-wfqv"],"database_specific":{"review_status":"UNREVIEWED","url":"https://pkg.go.dev/vuln/GO-2024-3241"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-5c4w-8hhh-3c3h"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-10006"},{"type":"FIX","url":"https://github.com/hashicorp/consul/commit/d9206fc7e284a9244af4d62f8653a63ca30bd00c"},{"type":"FIX","url":"https://github.com/hashicorp/consul/pull/21816"},{"type":"WEB","url":"https://discuss.hashicorp.com/t/hcsec-2024-23-consul-l7-intentions-vulnerable-to-headers-bypass"}],"affected":[{"package":{"name":"github.com/hashicorp/consul","ecosystem":"Go","purl":"pkg:golang/github.com/hashicorp/consul"},"ranges":[{"type":"SEMVER","events":[{"introduced":"1.9.0"},{"fixed":"1.20.1"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2024-3241.json"}}],"schema_version":"1.7.3"}