Skip to main content

Missing Authorization


Severity High
Score 7.1/10


HashiCorp Consul versions 1.8.1 through 1.11.8, 1.12.x through 1.12.4, and 1.13.x though 1.13.1 does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in versions 1.11.9, 1.12.5, and 1.13.2.

  • LOW
  • NONE
  • NONE
  • LOW
  • LOW
  • HIGH

CWE-862 - Missing Authorization

The missing authorization vulnerability occurs when a software program allows users to access privileged parts of the program without verifying the user credentials. Impact of such a vulnerability depends on the resources employed by the software, ranging from account takeover to sensitive information exposure, denial of service, and complete system takeover.

Advisory Timeline

  • Published