Логотип exploitDog
bind:"BDU:2023-02000" OR bind:"CVE-2023-27493"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2023-02000" OR bind:"CVE-2023-27493"

Количество 10

Количество 10

fstec логотип

BDU:2023-02000

больше 2 лет назад

Уязвимость реализации протокола mTLS (mutual TLS) прокси-сервера Envoy, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2023-27493

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2023-27493

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2023-27493

больше 2 лет назад

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.1
EPSS: Низкий
oracle-oval логотип

ELSA-2023-23649

больше 2 лет назад

ELSA-2023-23649: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-23648

больше 2 лет назад

ELSA-2023-23648: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12357

больше 2 лет назад

ELSA-2023-12357: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12356

больше 2 лет назад

ELSA-2023-12356: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12355

больше 2 лет назад

ELSA-2023-12355: istio security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-12354

больше 2 лет назад

ELSA-2023-12354: istio security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2023-02000

Уязвимость реализации протокола mTLS (mutual TLS) прокси-сервера Envoy, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-nati ...

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-23649

ELSA-2023-23649: olcne security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-23648

ELSA-2023-23648: olcne security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12357

ELSA-2023-12357: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12356

ELSA-2023-12356: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12355

ELSA-2023-12355: istio security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2023-12354

ELSA-2023-12354: istio security update (IMPORTANT)

больше 2 лет назад

Уязвимостей на страницу