Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-35943
HistoryJul 25, 2023 - 6:26 p.m.

CVE-2023-35943 Envoy vulnerable to CORS filter segfault when origin header is removed

2023-07-2518:26:23
CWE-416
GitHub_M
www.cve.org
1
envoy
cors filter
vulnerability

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.2%

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the origin header is removed and deleted between decodeHeadersand encodeHeaders. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the origin header in the Envoy configuration.

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "version": ">= 1.26.0, < 1.26.4",
        "status": "affected"
      },
      {
        "version": ">= 1.25.0, < 1.25.9",
        "status": "affected"
      },
      {
        "version": ">= 1.24.0, < 1.24.10",
        "status": "affected"
      },
      {
        "version": "< 1.23.12",
        "status": "affected"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.2%