Envoyproxy

Envoy

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 15.04.2020 02:15:14
  • Zuletzt bearbeitet 21.11.2024 04:58:34

Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the serv...

  • EPSS 0.03%
  • Veröffentlicht 04.03.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 05:39:13

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched t...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:41

An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filt...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:35

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Ho...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 13.12.2019 13:15:11
  • Zuletzt bearbeitet 21.11.2024 04:33:35

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-de...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 11.11.2019 01:15:10
  • Zuletzt bearbeitet 21.11.2024 04:33:40

Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."

  • EPSS 16.96%
  • Veröffentlicht 09.10.2019 16:15:14
  • Zuletzt bearbeitet 21.11.2024 04:28:14

Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 19.08.2019 23:15:10
  • Zuletzt bearbeitet 21.11.2024 04:28:14

In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). ...

  • EPSS 0.1%
  • Veröffentlicht 25.04.2019 16:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:32

Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and prov...

Exploit
  • EPSS 0.04%
  • Veröffentlicht 25.04.2019 15:29:01
  • Zuletzt bearbeitet 21.11.2024 04:52:32

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules,...