{"id":"CVE-2021-41805","details":"HashiCorp Consul Enterprise before 1.8.17, 1.9.x before 1.9.11, and 1.10.x before 1.10.4 has Incorrect Access Control. An ACL token (with the default operator:write permissions) in one namespace can be used for unintended privilege escalation in a different namespace.","aliases":["BIT-consul-2021-41805"],"modified":"2026-03-20T11:44:44.245505Z","published":"2021-12-12T05:15:07.917Z","references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20211229-0007/"},{"type":"ADVISORY","url":"https://www.hashicorp.com/blog/category/consul"},{"type":"ADVISORY","url":"https://discuss.hashicorp.com/t/hcsec-2021-29-consul-enterprise-namespace-default-acls-allow-privilege-escalation/31871"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/hashicorp/consul","events":[{"introduced":"95fb95bfe643d7886c4fb2d9f3afe1977d31cfec"},{"fixed":"df42e206d6ecf0ff4a09bc16b8ade37b0012d449"},{"introduced":"a417fe51040a33039d3282e31c6c6b6f4fd1f886"},{"fixed":"ecda4f8670b8fa10b8c38e800ab7db346e892424"},{"introduced":"27de64da7095570012e9f8f7aec16aaf66d2a773"},{"fixed":"7bbad6fe560ab27f51dd6c5cd16f28418082424c"}],"database_specific":{"versions":[{"introduced":"1.7.0"},{"fixed":"1.8.17"},{"introduced":"1.9.0"},{"fixed":"1.9.11"},{"introduced":"1.10.0"},{"fixed":"1.10.4"}]}}],"versions":["api/v1.10.1","api/v1.11.0","api/v1.7.0","api/v1.8.0","api/v1.8.1","api/v1.9.0","api/v1.9.1","sdk/v0.6.0","sdk/v0.7.0","sdk/v0.8.0","v1.10.0","v1.10.0-beta1","v1.10.0-beta2","v1.10.0-beta3","v1.10.0-beta4","v1.10.0-rc","v1.10.0-rc2","v1.10.1","v1.10.1-beta1","v1.10.2","v1.10.3","v1.7.0","v1.8.0-beta1","v1.8.0-beta2","v1.8.10","v1.8.11","v1.8.11-beta1","v1.8.11-beta2","v1.8.12","v1.8.13","v1.8.14","v1.8.15","v1.8.16","v1.8.3","v1.8.4","v1.8.5","v1.8.6","v1.8.7","v1.8.7-beta1","v1.8.8","v1.8.9","v1.8.9-beta1","v1.9.0","v1.9.0-beta1","v1.9.0-beta3","v1.9.0-rc1","v1.9.1","v1.9.10","v1.9.2","v1.9.3","v1.9.4","v1.9.5","v1.9.6","v1.9.7","v1.9.8","v1.9.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41805.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}