Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fx83-72pw-c56f

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

EPSS

Процентиль: 5%
0.00023
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 6 лет назад

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

CVSS3: 9.8
nvd
около 6 лет назад

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

suse-cvrf
почти 5 лет назад

Security update for nghttp2

suse-cvrf
почти 6 лет назад

Security update for nghttp2

suse-cvrf
почти 6 лет назад

Security update for nghttp2

EPSS

Процентиль: 5%
0.00023
Низкий

9.8 Critical

CVSS3