Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hqxw-mm44-gc4r

Опубликовано: 30 авг. 2021
Источник: github
Github: Прошло ревью
CVSS3: 8.1

Описание

Istio Fragments in Path May Lead to Authorization Policy Bypass

Impact

Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with #fragment in the path may bypass Istio’s URI path based authorization policies.

Patches

  • Istio 1.11.1 and above
  • Istio 1.10.4 and above
  • Istio 1.9.8 and above

Workarounds

A Lua filter may be written to normalize the path. This is similar to the Path normalization presented in the Security Best Practices guide.

References

More details can be found in the Istio Security Bulletin

For more information

If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com

Пакеты

Наименование

istio.io/istio

go
Затронутые версииВерсия исправления

< 1.9.8

1.9.8

Наименование

istio.io/istio

go
Затронутые версииВерсия исправления

>= 1.10.0, < 1.10.4

1.10.4

Наименование

istio.io/istio

go
Затронутые версииВерсия исправления

= 1.11.0

1.11.1

EPSS

Процентиль: 46%
0.00236
Низкий

8.1 High

CVSS3

Дефекты

CWE-706
CWE-863

Связанные уязвимости

CVSS3: 8.3
redhat
больше 4 лет назад

Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.

CVSS3: 8.1
nvd
больше 4 лет назад

Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize the path.

EPSS

Процентиль: 46%
0.00236
Низкий

8.1 High

CVSS3

Дефекты

CWE-706
CWE-863