Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-23326
HistoryJun 04, 2024 - 8:05 p.m.

CVE-2024-23326 Envoy incorrectly accepts HTTP 200 response for entering upgrade mode

2024-06-0420:05:48
CWE-391
GitHub_M
www.cve.org
9
envoy
http upgrade
request smuggling
vulnerability

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

37.2%

Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching protocols. Envoy incorrectly accepts a 200 response from a server when requesting a protocol upgrade, but 200 does not indicate protocol switch. This opens up the possibility of request smuggling through Envoy if the server can be tricked into adding the upgrade header to the response.

CNA Affected

[
  {
    "vendor": "envoyproxy",
    "product": "envoy",
    "versions": [
      {
        "version": ">= 1.13.0, <= 1.30.1",
        "status": "affected"
      },
      {
        "version": ">= 1.29.0, <= 1.29.4",
        "status": "affected"
      },
      {
        "version": ">= 1.28.0, <= 1.28.3",
        "status": "affected"
      },
      {
        "version": "<= 1.27.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.9

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.001

Percentile

37.2%

Related for CVELIST:CVE-2024-23326