Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-25017

Опубликовано: 29 сент. 2020
Источник: redhat
CVSS3: 8.3
EPSS Низкий

Описание

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

An incorrect access control bypass vulnerability was found in envoy proxy/envoy. This flaw allows an attacker to send multiple HTTP headers where only the first one is valid. Envoy then forwards all of the headers as valid to the upstream component. This issue allows an attacker to subvert any envoy filters or rules, causing an inconsistency between envoy and the upstream component, potentially gaining access to restricted resources.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1877613envoyproxy/envoy: incorrectly handles multiple HTTP headers in requests

EPSS

Процентиль: 17%
0.00053
Низкий

8.3 High

CVSS3

Связанные уязвимости

CVSS3: 8.3
nvd
больше 5 лет назад

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

CVSS3: 8.3
debian
больше 5 лет назад

Envoy through 1.15.0 only considers the first value when multiple head ...

EPSS

Процентиль: 17%
0.00053
Низкий

8.3 High

CVSS3