CVE-2022-29153

ADVISORY - github

Summary

A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5.

EPSS Score: 0.88401 (0.995)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Server-Side Request Forgery (SSRF)

ADVISORY - github

Server-Side Request Forgery (SSRF)

ADVISORY - gitlab

OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Server-Side Request Forgery (SSRF)

OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

ADVISORY - redhat

Server-Side Request Forgery (SSRF)


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in