Lucene search

K
cveGitHub_MCVE-2024-45810
HistorySep 20, 2024 - 12:15 a.m.

CVE-2024-45810

2024-09-2000:15:03
CWE-119
GitHub_M
web.nvd.nist.gov
26
envoy
http async client
crash
status code duplication
router destroy
ext_authz
request mirroring
vulnerability
upgrade
connection
cve-2024-45810

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.7%

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling sendLocalReply under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the sendLocalReply() in http async client, one reason is http async client is duplicating the status code, another one is the destroy of router is called at the destructor of the async stream, while the stream is deferred deleted at first. There will be problems that the stream decoder is destroyed but its reference is called in router.onDestroy(), causing segment fault. This will impact ext_authz if the upgrade and connection header are allowed, and request mirrorring. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected configurations

Nvd
Vulners
Node
envoyproxyenvoyRange<1.28.7
OR
envoyproxyenvoyRange1.29.01.29.9
OR
envoyproxyenvoyRange1.30.01.30.6
OR
envoyproxyenvoyRange1.31.01.31.2
VendorProductVersionCPE
envoyproxyenvoy*cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "version": "< 1.28.7",
        "status": "affected"
      },
      {
        "version": ">= 1.29.0, < 1.29.9",
        "status": "affected"
      },
      {
        "version": ">= 1.30.0, < 1.30.6",
        "status": "affected"
      },
      {
        "version": ">= 1.31.2, < 1.31.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

17.7%