Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8664

Опубликовано: 04 мар. 2020
Источник: debian
EPSS Низкий

Описание

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
envoyproxyitppackage

EPSS

Процентиль: 60%
0.00403
Низкий

Связанные уязвимости

CVSS3: 7.3
redhat
почти 6 лет назад

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.

CVSS3: 5.3
nvd
почти 6 лет назад

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость сетевого программного средства Envoy, связанная с ошибками авторизации, позволяющая нарушителю получить доступ к защищаемой информации

EPSS

Процентиль: 60%
0.00403
Низкий