Логотип exploitDog
bind:CVE-2021-32779
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-32779

Количество 6

Количество 6

redhat логотип

CVE-2021-32779

почти 4 года назад

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final "/admin" path element, or is using a negative assertion with final path element of "/admin". The client sends request to "/app1/admin#foo". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as "/admin#foo" and mismatches with the configured "/admin" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the off...

CVSS3: 8.3
EPSS: Низкий
nvd логотип

CVE-2021-32779

почти 4 года назад

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final "/admin" path element, or is using a negative assertion with final path element of "/admin". The client sends request to "/app1/admin#foo". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as "/admin#foo" and mismatches with the configured "/admin" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offend

CVSS3: 8.6
EPSS: Низкий
debian логотип

CVE-2021-32779

почти 4 года назад

Envoy is an open source L7 proxy and communication bus designed for la ...

CVSS3: 8.6
EPSS: Низкий
oracle-oval логотип

ELSA-2021-9525

больше 3 лет назад

ELSA-2021-9525: olcne security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9546

больше 3 лет назад

ELSA-2021-9546: olcne istio istio kubernetes security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2021-9526

больше 3 лет назад

ELSA-2021-9526: olcne security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2021-32779

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final "/admin" path element, or is using a negative assertion with final path element of "/admin". The client sends request to "/app1/admin#foo". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as "/admin#foo" and mismatches with the configured "/admin" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the off...

CVSS3: 8.3
0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-32779

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final "/admin" path element, or is using a negative assertion with final path element of "/admin". The client sends request to "/app1/admin#foo". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as "/admin#foo" and mismatches with the configured "/admin" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offend

CVSS3: 8.6
0%
Низкий
почти 4 года назад
debian логотип
CVE-2021-32779

Envoy is an open source L7 proxy and communication bus designed for la ...

CVSS3: 8.6
0%
Низкий
почти 4 года назад
oracle-oval логотип
ELSA-2021-9525

ELSA-2021-9525: olcne security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9546

ELSA-2021-9546: olcne istio istio kubernetes security update (IMPORTANT)

больше 3 лет назад
oracle-oval логотип
ELSA-2021-9526

ELSA-2021-9526: olcne security update (IMPORTANT)

больше 3 лет назад

Уязвимостей на страницу