Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.
References
Link | Resource |
---|---|
https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e | Patch Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2 | Issue Tracking Third Party Advisory |
https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e | Patch Third Party Advisory |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2 | Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 06:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e - Patch, Third Party Advisory | |
References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2 - Issue Tracking, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.8
v3 : 7.4 |
24 Jul 2023, 13:50
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-843 |
Information
Published : 2022-02-22 23:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21656
Mitre link : CVE-2022-21656
CVE.ORG link : CVE-2022-21656
JSON object : View
Products Affected
envoyproxy
- envoy