Envoyproxy

Envoy

85 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.16%
  • Veröffentlicht 11.11.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:33:40

Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."

  • EPSS 13.1%
  • Veröffentlicht 09.10.2019 16:15:14
  • Zuletzt bearbeitet 21.11.2024 04:28:14

Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 19.08.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:28:14

In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). ...

  • EPSS 0.1%
  • Veröffentlicht 25.04.2019 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:32

Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and prov...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 25.04.2019 15:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:32

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules,...