Логотип exploitDog
bind: "CVE-2024-23324"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2024-23324"

Количество 5

Количество 5

redhat логотип

CVE-2024-23324

больше 1 года назад

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2024-23324

больше 1 года назад

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2024-23324

больше 1 года назад

Envoy is a high-performance edge/middle/service proxy. External authen ...

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2024-02904

больше 1 года назад

Уязвимость прокси-сервера Envoy, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю обойти процесс аутентификации

CVSS3: 7.5
EPSS: Низкий
redos логотип

ROS-20240423-06

около 1 года назад

Множественные уязвимости consul

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-23324

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 7.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-23324

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 8.6
0%
Низкий
больше 1 года назад
debian логотип
CVE-2024-23324

Envoy is a high-performance edge/middle/service proxy. External authen ...

CVSS3: 8.6
0%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-02904

Уязвимость прокси-сервера Envoy, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю обойти процесс аутентификации

CVSS3: 7.5
0%
Низкий
больше 1 года назад
redos логотип
ROS-20240423-06

Множественные уязвимости consul

CVSS3: 7.5
около 1 года назад

Уязвимостей на страницу