Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-18802

Опубликовано: 10 дек. 2019
Источник: redhat
CVSS3: 7.5

Описание

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

A flaw was found in envoy. A malformed request header may cause route matchers or access controls to be bypassed, resulting in escalation of privileges or information disclosure. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Дополнительная информация

Статус:

Important
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1773447envoy: malformed request header may cause bypass of route matchers resulting in escalation of privileges or information disclosure

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

suse-cvrf
почти 5 лет назад

Security update for nghttp2

suse-cvrf
почти 6 лет назад

Security update for nghttp2

suse-cvrf
почти 6 лет назад

Security update for nghttp2

CVSS3: 9.8
github
больше 3 лет назад

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.

7.5 High

CVSS3