Lucene search

K
nvd[email protected]NVD:CVE-2024-23326
HistoryJun 04, 2024 - 9:15 p.m.

CVE-2024-23326

2024-06-0421:15:33
CWE-444
CWE-391
web.nvd.nist.gov
3
envoy
request smuggling
upgrade header
vulnerability
cloud-native
open source
edge and service proxy
rfc 7230
protocol switch

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

37.3%

Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching protocols. Envoy incorrectly accepts a 200 response from a server when requesting a protocol upgrade, but 200 does not indicate protocol switch. This opens up the possibility of request smuggling through Envoy if the server can be tricked into adding the upgrade header to the response.

Affected configurations

NVD
Node
envoyproxyenvoyRange<1.27.6
OR
envoyproxyenvoyRange1.28.01.28.4
OR
envoyproxyenvoyRange1.29.01.29.5
OR
envoyproxyenvoyRange1.30.01.30.2

8.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

0.001 Low

EPSS

Percentile

37.3%

Related for NVD:CVE-2024-23326