Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-35941
HistoryJul 25, 2023 - 5:40 p.m.

CVE-2023-35941 Envoy vulnerable to OAuth2 credentials exploit with permanent validity

2023-07-2517:40:56
CWE-116
GitHub_M
www.cve.org
1
envoy
oauth2
credentials
exploit
fixed
versions
vulnerability
cloud-native
applications
workaround
wildcards
host's domain

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.3%

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter’s check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host’s domain configuration.

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "version": ">= 1.26.0, < 1.26.4",
        "status": "affected"
      },
      {
        "version": ">= 1.25.0, < 1.25.9",
        "status": "affected"
      },
      {
        "version": ">= 1.24.0, < 1.24.10",
        "status": "affected"
      },
      {
        "version": "< 1.23.12",
        "status": "affected"
      }
    ]
  }
]

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.3%