CVE-2023-27493

CVSS v3.1 9.1 (Critical)
91% Progress
EPSS 0.13 % (49th)
0.13% Progress
Affected Products 1
Advisories 1

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.

Weaknesses
CWE-20
Improper Input Validation
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CVE Status
PUBLISHED
CNA
GitHub, Inc.
Published Date
2023-04-04 20:15:07
(17 months ago)
Updated Date
2023-04-11 14:44:07
(17 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Envoyproxy Envoy prior 1.22.9 version cpe:2.3:a:envoyproxy:envoy < 1.22.9
  Envoyproxy Envoy from 1.23.0 version and prior 1.23.6 version cpe:2.3:a:envoyproxy:envoy >= 1.23.0 < 1.23.6
  Envoyproxy Envoy from 1.24.0 version and prior 1.24.4 version cpe:2.3:a:envoyproxy:envoy >= 1.24.0 < 1.24.4
  Envoyproxy Envoy from 1.25.0 version and prior 1.25.3 version cpe:2.3:a:envoyproxy:envoy >= 1.25.0 < 1.25.3
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...