Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8664

Опубликовано: 03 мар. 2020
Источник: redhat
CVSS3: 7.3

Описание

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.

An access control bypass vulnerability was found in envoy. When the same TLS secret is used across multiple resources, the client's data, such as the subject alternative name or hash, is not validated. This flaw could lead to a possible bypass of security restrictions.

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-284
https://bugzilla.redhat.com/show_bug.cgi?id=1802542envoy: Incorrect Access Control when using SDS with Combined Validation Context

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
почти 6 лет назад

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS with Combined Validation Context. Using the same secret (e.g. trusted CA) across many resources together with the combined validation context could lead to the “static” part of the validation context to be not applied, even though it was visible in the active config dump.

CVSS3: 5.3
debian
почти 6 лет назад

CNCF Envoy through 1.13.0 has incorrect Access Control when using SDS ...

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость сетевого программного средства Envoy, связанная с ошибками авторизации, позволяющая нарушителю получить доступ к защищаемой информации

7.3 High

CVSS3