CVE-2022-29153
Description
HashiCorp Consul and Consul Enterprise up to 1.9.16, 1.10.9, and 1.11.4 may allow server side request forgery when the Consul client agent follows redirects returned by HTTP health check endpoints. Fixed in 1.9.17, 1.10.10, and 1.11.5.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
HashiCorp Consul up to 1.9.16, 1.10.9, and 1.11.4 allows SSRF via HTTP health check redirect following.
Vulnerability
HashiCorp Consul and Consul Enterprise up to versions 1.9.16, 1.10.9, and 1.11.4 contain a server-side request forgery (SSRF) vulnerability in the HTTP health check functionality. When a Consul client agent performs an HTTP health check against an endpoint that returns an HTTP redirect, the agent follows the redirect, potentially sending requests to arbitrary internal or external hosts. This behavior is exploitable when health checks are defined by parties across trust boundaries, such as in multi-tenant environments [2][4].
Exploitation
An attacker must be able to define or influence an HTTP health check endpoint that returns a redirect. In multi-tenant deployments, a user with permission to register health checks can configure a check pointing to an attacker-controlled server. When the Consul agent executes the health check, the attacker's server responds with an HTTP redirect (e.g., 301 or 302) to an internal service (e.g., http://internal-service:8500). The agent follows the redirect, effectively acting as a proxy and enabling SSRF [4].
Impact
Successful exploitation allows the attacker to perform server-side request forgery from the perspective of the Consul client agent. This can bypass network isolation and access internal services that are not intended to be exposed, potentially leading to information disclosure, further lateral movement, or compromise of internal systems [2][4].
Mitigation
The vulnerability is fixed in Consul and Consul Enterprise versions 1.9.17, 1.10.10, and 1.11.5. Users should upgrade to these versions or later. Additionally, a new configuration option disable_redirects has been introduced for HTTP health checks; setting it to true prevents the agent from following redirects. The default remains false in the fixed versions, but HashiCorp plans to change the default to true in a future release [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/consulGo | < 1.9.17 | 1.9.17 |
github.com/hashicorp/consulGo | >= 1.10.0, < 1.10.10 | 1.10.10 |
github.com/hashicorp/consulGo | >= 1.11.0, < 1.11.5 | 1.11.5 |
Affected products
27- HashiCorp/Consuldescription
- osv-coords26 versionspkg:apk/chainguard/consul-1.15pkg:apk/chainguard/consul-1.15-oci-entrypointpkg:apk/chainguard/consul-1.15-oci-entrypoint-compatpkg:apk/chainguard/consul-1.16pkg:apk/chainguard/consul-1.16-oci-entrypointpkg:apk/chainguard/consul-1.16-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17pkg:apk/chainguard/consul-1.17-fipspkg:apk/chainguard/consul-1.17-fips-oci-entrypointpkg:apk/chainguard/consul-1.17-fips-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17-oci-entrypointpkg:apk/chainguard/consul-1.17-oci-entrypoint-compatpkg:apk/chainguard/k3dpkg:apk/chainguard/k3d-proxypkg:apk/chainguard/k3d-toolspkg:apk/wolfi/consul-1.15pkg:apk/wolfi/consul-1.15-oci-entrypointpkg:apk/wolfi/consul-1.15-oci-entrypoint-compatpkg:apk/wolfi/consul-1.16pkg:apk/wolfi/consul-1.16-oci-entrypointpkg:apk/wolfi/consul-1.16-oci-entrypoint-compatpkg:apk/wolfi/k3dpkg:apk/wolfi/k3d-proxypkg:apk/wolfi/k3d-toolspkg:bitnami/consulpkg:golang/github.com/hashicorp/consul
< 1.15.11-r5+ 25 more
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 1.9.17
- (no CPE)range: < 1.9.17
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- github.com/advisories/GHSA-q6h7-4qgw-2j9pghsaADVISORY
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWH/mitrevendor-advisory
- nvd.nist.gov/vuln/detail/CVE-2022-29153ghsaADVISORY
- security.gentoo.org/glsa/202208-09ghsavendor-advisoryWEB
- discuss.hashicorp.comghsaWEB
- discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgeryghsaWEB
- discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/38393ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWHghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBODKZL7HQE5XXS3SA2VIDVL4LAA5RWHghsaWEB
- security.netapp.com/advisory/ntap-20220602-0005ghsaWEB
- discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/mitre
- security.netapp.com/advisory/ntap-20220602-0005/mitre
News mentions
0No linked articles in our index yet.