Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-30851
HistoryMay 25, 2023 - 5:47 p.m.

CVE-2023-30851 Potential HTTP policy bypass when using header rules in Cilium

2023-05-2517:47:51
CWE-693
GitHub_M
www.cve.org
2
cve-2023-30851
http
policy bypass
cilium
ebpf
dataplane
endpoint
wildcard rule
patch

CVSS3

2.6

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

40.2%

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple toEndpoints AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.

CNA Affected

[
  {
    "vendor": "cilium",
    "product": "cilium",
    "versions": [
      {
        "version": "< 1.11.16",
        "status": "affected"
      },
      {
        "version": ">= 1.12.0, < 1.12.9",
        "status": "affected"
      },
      {
        "version": ">= 1.13.0, < 1.13.2",
        "status": "affected"
      }
    ]
  }
]

CVSS3

2.6

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

AI Score

5.5

Confidence

High

EPSS

0.001

Percentile

40.2%

Related for CVELIST:CVE-2023-30851