CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:53

Type Values Removed Values Added
References () https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q - Exploit, Vendor Advisory () https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 8.1

Information

Published : 2023-04-04 20:15

Updated : 2024-11-21 07:53


NVD link : CVE-2023-27493

Mitre link : CVE-2023-27493

CVE.ORG link : CVE-2023-27493


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-20

Improper Input Validation

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')