Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-31920

Опубликовано: 11 мая 2021
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Istio before 1.8.6 and 1.9.x before 1.9.5 has a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio authorization policy when path based authorization rules are used.

An authorization bypass flaw was found in Istio. This flaw allows an attacker to craft an HTTP request that defines a certain pattern of escaped characters in the URI path (such as %2F, %2f, %5C, or %5c), allowing them to bypass the authorization service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This CVE addresses the specific fixes required in istio to support the vulnerability found in envoyproxy/envoy, CVE-2021-29492.

Дополнительная информация

Статус:

Important
Дефект:
CWE-863
https://bugzilla.redhat.com/show_bug.cgi?id=1959481istio/istio: HTTP request with escaped slash characters can bypass authorization mechanisms

EPSS

Процентиль: 41%
0.00191
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 4 лет назад

Istio before 1.8.6 and 1.9.x before 1.9.5 has a remotely exploitable vulnerability where an HTTP request path with multiple slashes or escaped slash characters (%2F or %5C) could potentially bypass an Istio authorization policy when path based authorization rules are used.

CVSS3: 6.5
github
больше 3 лет назад

Istio Authorization Bypass Vulnerability

oracle-oval
больше 4 лет назад

ELSA-2021-9399: olcne security update (IMPORTANT)

oracle-oval
больше 4 лет назад

ELSA-2021-9398: olcne security update (IMPORTANT)

oracle-oval
больше 4 лет назад

ELSA-2021-9397: olcne security update (IMPORTANT)

EPSS

Процентиль: 41%
0.00191
Низкий

8.1 High

CVSS3