Логотип exploitDog
bind:"BDU:2023-02007" OR bind:"CVE-2023-27487"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-02007" OR bind:"CVE-2023-27487"

Количество 10

Количество 10

fstec логотип

BDU:2023-02007

больше 2 лет назад

Уязвимость прокси-сервера Envoy, связанная с недостаточной проверкой входных данных, позволяющая нарушителю обойти процедуру аутентификации и получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
EPSS: Низкий
redhat логотип

CVE-2023-27487

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
EPSS: Низкий
nvd логотип

CVE-2023-27487

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
EPSS: Низкий
debian логотип

CVE-2023-27487

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.2
EPSS: Низкий
oracle-oval логотип

ELSA-2023-23649

больше 2 лет назад

ELSA-2023-23649: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-23648

больше 2 лет назад

ELSA-2023-23648: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12357

больше 2 лет назад

ELSA-2023-12357: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12356

больше 2 лет назад

ELSA-2023-12356: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12355

больше 2 лет назад

ELSA-2023-12355: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12354

больше 2 лет назад

ELSA-2023-12354: istio security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-02007

Уязвимость прокси-сервера Envoy, связанная с недостаточной проверкой входных данных, позволяющая нарушителю обойти процедуру аутентификации и получить несанкционированный доступ к защищаемой информации

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-27487

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27487

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header `x-envoy-original-path` should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for `jwt_authn` checks if the `jwt_authn` filter is used, and any other upstream use of the x-envoy-original-path header. Attackers may forge a trusted `x-envoy-original-path` header. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 have patches for this issue.

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-27487

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.2
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-23649

ELSA-2023-23649: olcne security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-23648

ELSA-2023-23648: olcne security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12357

ELSA-2023-12357: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12356

ELSA-2023-12356: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12355

ELSA-2023-12355: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12354

ELSA-2023-12354: istio security update (IMPORTANT)

больше 2 лет назад

Уязвимостей на страницу