Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-27487

Опубликовано: 04 апр. 2023
Источник: redhat
CVSS3: 8.2
EPSS Низкий

Описание

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header x-envoy-original-path should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for jwt_authn checks if the jwt_authn filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted x-envoy-original-path header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

A flaw was found in envoy. The header x-envoy-original-path should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header could then be used for trace logs and grpc logs, used in the URL for jwt_authn checks if the jwt_authn filter is used, and any other upstream use of the x-envoy-original-path header.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.1servicemesh-proxyAffected
Red Hat OpenShift Service Mesh 2.2 for RHEL 8openshift-service-mesh/proxyv2-rhel8FixedRHSA-2023:462311.08.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2179135envoy: Client may fake the header `x-envoy-original-path`

EPSS

Процентиль: 5%
0.00024
Низкий

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
debian
больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.2
fstec
больше 2 лет назад

Уязвимость прокси-сервера Envoy, связанная с недостаточной проверкой входных данных, позволяющая нарушителю обойти процедуру аутентификации и получить несанкционированный доступ к защищаемой информации

oracle-oval
больше 2 лет назад

ELSA-2023-23649: olcne security update (IMPORTANT)

oracle-oval
больше 2 лет назад

ELSA-2023-23648: olcne security update (IMPORTANT)

EPSS

Процентиль: 5%
0.00024
Низкий

8.2 High

CVSS3