Skip to main content

Missing Authorization


Severity Medium
Score 6.5/10


HashiCorp Consul and Consul Enterprise versions prior to 1.8.15, 1.9.x prior to 1.9.9, and 1.10.x prior to 1.10.2, Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic.

  • LOW
  • NONE
  • NONE
  • LOW
  • HIGH
  • NONE

CWE-862 - Missing Authorization

The missing authorization vulnerability occurs when a software program allows users to access privileged parts of the program without verifying the user credentials. Impact of such a vulnerability depends on the resources employed by the software, ranging from account takeover to sensitive information exposure, denial of service, and complete system takeover.

Advisory Timeline

  • Published