Consul API publicly exposed

漏洞信息

漏洞名称: Consul API publicly exposed

漏洞类型: 未授权访问

漏洞等级: 高危

漏洞描述: Consul是一种服务网络解决方案,用于自动化网络配置、发现服务并实现跨任何云或运行时的安全连接。Consul API设计为在受信任的环境中访问,不建议公开访问。此漏洞涉及Consul API未授权访问问题,由于API被错误地配置为公开可访问,攻击者无需任何认证即可访问敏感信息。技术根源在于缺乏适当的访问控制措施,导致未经授权的用户可以获取到包含配置信息、调试配置和遥测数据的敏感信息。这种漏洞可能导致敏感信息泄露,攻击者可以利用这些信息进行进一步的攻击,如服务配置篡改或服务中断。由于无需认证即可利用,此漏洞的风险较高,尤其是在公开暴露的Consul API实例中。

产品厂商: Consul

产品名称: Consul API

来源: https://github.com/zan8in/afrog/blob/2f6722015a76956b8f84dd0c2780c67e9e933ae9/pocs%2Ftemp%2Fafrog-pocs%2Fvulnerability%2Fconsul-api-discosure.yaml

类型: zan8in/afrog:github commit

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28

id: consul-api-discosure

info:
name: Consul API publicly exposed
author: zan8in
severity: high
verified: true
description: |-
Consul is a service networking solution to automate network configurations, discover services, and enable secure connectivity across any cloud or runtime.
Consul API is designed to be accessed inside trusted environments. It's not recommended to have Consul API publicly accessible.
tags: consul,api,disclosure
created: 2025/07/17

rules:
r0:
request:
method: GET
path: /v1/agent/self
expression: |
response.status == 200 &&
response.headers["content-type"].contains("application/json") &&
response.body.bcontains(b'"Config":') &&
response.body.bcontains(b'"DebugConfig":') &&
response.body.bcontains(b'"Telemetry":')
expression: r0()



Consul API publicly exposed
http://example.com/2025/07/17/github_1072047752/
作者
lianccc
发布于
2025年7月17日
许可协议