{"id":"GO-2022-1029","summary":"HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul","details":"HashiCorp Consul vulnerable to authorization bypass in github.com/hashicorp/consul","aliases":["BIT-consul-2022-40716","CVE-2022-40716","GHSA-m69r-9g56-7mv8"],"modified":"2026-03-17T04:29:06.445810Z","published":"2024-08-21T16:03:24Z","related":["CGA-2f56-mhq5-ggwp"],"database_specific":{"review_status":"UNREVIEWED","url":"https://pkg.go.dev/vuln/GO-2022-1029"},"references":[{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-m69r-9g56-7mv8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-40716"},{"type":"FIX","url":"https://github.com/hashicorp/consul/commit/8f6fb4f6fe9488b8ec37da71ac503081d7d3760b"},{"type":"FIX","url":"https://github.com/hashicorp/consul/pull/14579"},{"type":"WEB","url":"https://discuss.hashicorp.com"},{"type":"WEB","url":"https://discuss.hashicorp.com/t/hcsec-2022-20-consul-service-mesh-intention-bypass-with-malicious-certificate-signing-request/44628"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYZOKMMVX4SIEHPJW3SJUQGMO5YZCPHC"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTE4ITXXPIWZEQ4HYQCB6N6GZIMWXDAI"}],"affected":[{"package":{"name":"github.com/hashicorp/consul","ecosystem":"Go","purl":"pkg:golang/github.com/hashicorp/consul"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.11.9"},{"introduced":"1.12.0"},{"fixed":"1.12.5"},{"introduced":"1.13.0"},{"fixed":"1.13.2"}]}],"ecosystem_specific":{},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-1029.json"}}],"schema_version":"1.7.5"}