Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rwjg-c3h2-f57p

Опубликовано: 05 дек. 2025
Источник: github
Github: Прошло ревью
CVSS3: 5

Описание

Envoy's TLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte

Summary

Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.

Details

This occurs when the SAN is encoded as a BMPSTRING or UNIVERSALSTRING, and its UTF-8 conversion result is truncated at the first null byte during string assignment. As a result, "victim\0evil" may match an exact: "victim" rule and be accepted by Envoy.

PoC

Create a CA and a server certificate signed by that CA. Create two client certificates signed by the same CA: client_evil with OTHERNAME BMPSTRING = "evil" client_null with OTHERNAME BMPSTRING = "victim\0evil" Configure Envoy with require_client_certificate: true and a match_typed_subject_alt_names entry for the OTHERNAME OID with matcher.exact: "victim". Connect without a client cert → connection rejected. Connect with client_evil → connection rejected. Connect with client_null → connection accepted (but shouldn't!).

Impact

An attacker who can obtain a trusted client certificate with a null byte embedded in an OTHERNAME SAN can exploit this vulnerability. The practical impact is unauthorized impersonation of the matched identity, enabling access to services or APIs protected by that exact OTHERNAME check.

Credit

markevich.nikita1@gmail.com

Пакеты

Наименование

github.com/envoyproxy/envoy

go
Затронутые версииВерсия исправления

>= 1.36.0, <= 1.36.2

1.36.3

Наименование

github.com/envoyproxy/envoy

go
Затронутые версииВерсия исправления

>= 1.35.0, <= 1.35.6

1.35.7

Наименование

github.com/envoyproxy/envoy

go
Затронутые версииВерсия исправления

>= 1.34.0, <= 1.34.10

1.34.11

Наименование

github.com/envoyproxy/envoy

go
Затронутые версииВерсия исправления

<= 1.33.12

1.33.13

EPSS

Процентиль: 0%
0.00004
Низкий

5 Medium

CVSS3

Дефекты

CWE-170

Связанные уязвимости

CVSS3: 5
nvd
2 месяца назад

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.34.10, 1.35.6, 1.36.2, and earlier, Envoy’s mTLS certificate matcher for match_typed_subject_alt_names may incorrectly treat certificates containing an embedded null byte (\0) inside an OTHERNAME SAN value as valid matches.

CVSS3: 5
debian
2 месяца назад

Envoy is a high-performance edge/middle/service proxy. In 1.33.12, 1.3 ...

EPSS

Процентиль: 0%
0.00004
Низкий

5 Medium

CVSS3

Дефекты

CWE-170