Envoyproxy

Envoy

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.42%
  • Veröffentlicht 11.03.2021 03:15:12
  • Zuletzt bearbeitet 21.11.2024 05:48:14

Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is conf...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 15.12.2020 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:21

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

  • EPSS 0.78%
  • Veröffentlicht 15.12.2020 01:15:13
  • Zuletzt bearbeitet 21.11.2024 05:27:21

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

  • EPSS 2.91%
  • Veröffentlicht 01.10.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:16:32

Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 01.10.2020 17:15:13
  • Zuletzt bearbeitet 21.11.2024 05:16:31

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

  • EPSS 0.12%
  • Veröffentlicht 14.07.2020 22:15:10
  • Zuletzt bearbeitet 21.11.2024 05:04:49

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would in...

  • EPSS 0.11%
  • Veröffentlicht 01.07.2020 15:15:15
  • Zuletzt bearbeitet 21.11.2024 05:39:13

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.

  • EPSS 0.79%
  • Veröffentlicht 01.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

  • EPSS 0.44%
  • Veröffentlicht 01.07.2020 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

  • EPSS 0.79%
  • Veröffentlicht 01.07.2020 14:15:14
  • Zuletzt bearbeitet 21.11.2024 04:59:54

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.