Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-27487

Опубликовано: 04 апр. 2023
Источник: nvd
CVSS3: 8.2
CVSS3: 9.1
EPSS Низкий

Описание

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header x-envoy-original-path should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for jwt_authn checks if the jwt_authn filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted x-envoy-original-path header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Версия до 1.22.9 (исключая)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Версия от 1.23.0 (включая) до 1.23.6 (исключая)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Версия от 1.24.0 (включая) до 1.24.4 (исключая)
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
Версия от 1.25.0 (включая) до 1.25.3 (исключая)

EPSS

Процентиль: 5%
0.00024
Низкий

8.2 High

CVSS3

9.1 Critical

CVSS3

Дефекты

CWE-20
NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 8.2
redhat
больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
debian
больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.2
fstec
больше 2 лет назад

Уязвимость прокси-сервера Envoy, связанная с недостаточной проверкой входных данных, позволяющая нарушителю обойти процедуру аутентификации и получить несанкционированный доступ к защищаемой информации

oracle-oval
больше 2 лет назад

ELSA-2023-23649: olcne security update (IMPORTANT)

oracle-oval
больше 2 лет назад

ELSA-2023-23648: olcne security update (IMPORTANT)

EPSS

Процентиль: 5%
0.00024
Низкий

8.2 High

CVSS3

9.1 Critical

CVSS3

Дефекты

CWE-20
NVD-CWE-noinfo