Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-13170: Local ACL Token Used in Remote Datacenters #8068

Merged
merged 1 commit into from
Jun 9, 2020

Conversation

hanshasselberg
Copy link
Member

@hanshasselberg hanshasselberg commented Jun 9, 2020

Summary

When token replication is not enabled in a secondary datacenter, attempts to use a local token created in the primary are successful for operations targeting that secondary datacenter. Thus what was meant to be scoped to a single datacenter is valid in other datacenters.

Background

Consul has two types of tokens, Global and Local. Local tokens are meant to only be resolvable and used within a single datacenter. Creation of local tokens is only allowed if either token replication is enabled in a secondary datacenter, or if the datacenter the token is scoped to is the primary. In a typical cluster we expect that either token replication is on in all datacenters or local tokens are not used at all.

Remediation

Steps to remediate:

  • Update to Consul v1.7.4 or v1.6.6

@hanshasselberg hanshasselberg merged commit 242994a into master Jun 9, 2020
@hanshasselberg hanshasselberg deleted the acl_fix branch June 9, 2020 19:13
@hanshasselberg hanshasselberg changed the title do not resolve local tokens from remote dcs CVE-2020-13170: Local ACL Token Used in Remote Datacenters Jun 10, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants