A vulnerability was identified in Consul and Consul Enterprise such that the server response did not explicitly set a Content-Type HTTP header, allowing user-provided inputs to be misinterpreted and lead to reflected XSS.
{ "binaries": [ { "binary_name": "consul", "binary_version": "0.6.4~dfsg-3" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "0.6.4~dfsg-3" } ] }
{ "binaries": [ { "binary_name": "consul", "binary_version": "1.5.2+dfsg2-14" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "1.5.2+dfsg2-14" } ] }
{ "binaries": [ { "binary_name": "consul", "binary_version": "1.8.7+dfsg1-3" }, { "binary_name": "golang-github-hashicorp-consul-dev", "binary_version": "1.8.7+dfsg1-3" } ] }