{"api_version":"1","generated_at":"2026-04-22T20:52:41+00:00","cve":"CVE-2022-29153","urls":{"html":"https://cve.report/CVE-2022-29153","api":"https://cve.report/api/cve/CVE-2022-29153.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29153","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29153"},"summary":{"title":"CVE-2022-29153","description":"HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-04-19 16:17:00","updated_at":"2023-02-23 20:17:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20220602-0005/","name":"https://security.netapp.com/advisory/ntap-20220602-0005/","refsource":"CONFIRM","tags":[],"title":"CVE-2022-29153 HashiCorp Consul Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/","name":"FEDORA-2022-7e327a20be","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 37 Update: moby-engine-20.10.21-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/","name":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/","refsource":"MISC","tags":[],"title":"HCSEC-2022-10 - Consul’s HTTP Health Check May Allow Server Side Request Forgery - Security - HashiCorp Discuss","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.gentoo.org/glsa/202208-09","name":"GLSA-202208-09","refsource":"GENTOO","tags":[],"title":"HashiCorp Consul: Multiple Vulnerabilities (GLSA 202208-09) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/","refsource":"MISC","tags":[],"title":"[SECURITY] Fedora 37 Update: moby-engine-20.10.21-1.fc37 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://discuss.hashicorp.com","name":"https://discuss.hashicorp.com","refsource":"MISC","tags":[],"title":"HashiCorp Discuss","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393","name":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393","refsource":"MISC","tags":[],"title":"HCSEC-2022-10 - Consul’s HTTP Health Check May Allow Server Side Request Forgery - Security - HashiCorp Discuss","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29153","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29153","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29153","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"37","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29153","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hashicorp","cpe5":"consul","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29153","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hashicorp","cpe5":"consul","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-29153","qid":"283560","title":"Fedora Security Update for containerd (FEDORA-2022-7e327a20be)"},{"cve":"CVE-2022-29153","qid":"283567","title":"Fedora Security Update for containerd (FEDORA-2022-db674bafd9)"},{"cve":"CVE-2022-29153","qid":"283589","title":"Fedora Security Update for moby (FEDORA-2023-fde38dda12)"},{"cve":"CVE-2022-29153","qid":"710589","title":"Gentoo Linux HashiCorp Consul Multiple Vulnerabilities (GLSA 202208-09)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2022-29153","ASSIGNER":"cve@mitre.org","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a","version_affected":"?"}]}}]}}]}},"references":{"reference_data":[{"url":"https://discuss.hashicorp.com","refsource":"MISC","name":"https://discuss.hashicorp.com"},{"url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393","refsource":"MISC","name":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393"},{"url":"https://security.netapp.com/advisory/ntap-20220602-0005/","refsource":"MISC","name":"https://security.netapp.com/advisory/ntap-20220602-0005/"},{"url":"https://security.gentoo.org/glsa/202208-09","refsource":"MISC","name":"https://security.gentoo.org/glsa/202208-09"},{"url":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/","refsource":"MISC","name":"https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/","refsource":"MISC","name":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/"}]}},"nvd":{"publishedDate":"2022-04-19 16:17:00","lastModifiedDate":"2023-02-23 20:17:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.11.0","versionEndExcluding":"1.11.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*","versionStartIncluding":"1.11.0","versionEndExcluding":"1.11.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*","versionStartIncluding":"1.10.0","versionEndExcluding":"1.10.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"1.10.0","versionEndExcluding":"1.10.10","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:-:*:*:*","versionEndExcluding":"1.9.17","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hashicorp:consul:*:*:*:*:enterprise:*:*:*","versionEndExcluding":"1.9.17","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}