Lucene search

K

Envoy Security Vulnerabilities

cve
cve

CVE-2019-15225

In Envoy through 1.11.1, users may configure a route to match incoming path headers via the libstdc++ regular expression implementation. A remote attacker may send a request with a very long URI to result in a denial of service (memory consumption). This is a related issue to CVE-2019-14993.

7.5CVSS

7.3AI Score

0.003EPSS

2019-08-19 11:15 PM
89
cve
cve

CVE-2019-15226

Upon receiving each incoming request header data, Envoy will iterate over existing request headers to verify that the total size of the headers stays below a maximum limit. The implementation in versions 1.10.0 through 1.11.1 for HTTP/1.x traffic and all versions of Envoy for HTTP/2 traffic had O(n...

7.5CVSS

7.7AI Score

0.005EPSS

2019-10-09 04:15 PM
50
cve
cve

CVE-2019-18801

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send HTTP/2 requests that write to the heap outside of the request buffers when the upstream is HTTP/1. This may be used to corrupt nearby heap contents (leading to a query-of-death scenario) or may be used to bypass Envoy's ac...

9.8CVSS

9.3AI Score

0.004EPSS

2019-12-13 01:15 PM
51
cve
cve

CVE-2019-18802

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "exampl...

9.8CVSS

9.2AI Score

0.005EPSS

2019-12-13 01:15 PM
142
cve
cve

CVE-2019-18836

Envoy 1.12.0 allows a remote denial of service because of resource loops, as demonstrated by a single idle TCP connection being able to keep a worker thread in an infinite busy loop when continue_on_listener_filters_timeout is used."

7.5CVSS

7.2AI Score

0.009EPSS

2019-11-11 01:15 AM
163
cve
cve

CVE-2019-18838

An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent to the client. An enco...

7.5CVSS

8.3AI Score

0.004EPSS

2019-12-13 01:15 PM
43
cve
cve

CVE-2019-9900

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.

8.3CVSS

8AI Score

0.005EPSS

2019-04-25 03:29 PM
43
cve
cve

CVE-2019-9901

Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided ...

10CVSS

8.8AI Score

0.004EPSS

2019-04-25 04:29 PM
50
cve
cve

CVE-2020-11767

Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the server(s) listening behind *.example.com. The outcome...

3.1CVSS

3.9AI Score

0.001EPSS

2020-04-15 02:15 AM
77
cve
cve

CVE-2020-12603

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when proxying HTTP/2 requests or responses with many small (i.e. 1 byte) data frames.

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-01 02:15 PM
79
cve
cve

CVE-2020-12604

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier is susceptible to increased memory usage in the case where an HTTP/2 client requests a large payload but does not send enough window updates to consume the entire stream and does not reset the stream.

7.5CVSS

7.3AI Score

0.001EPSS

2020-07-01 03:15 PM
77
cve
cve

CVE-2020-12605

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may consume excessive amounts of memory when processing HTTP/1.1 headers with long field names or requests with long URLs.

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-01 03:15 PM
87
cve
cve

CVE-2020-15104

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would incorrectly allow nested.subdomain.example.com, whe...

5.4CVSS

5.6AI Score

0.001EPSS

2020-07-14 10:15 PM
55
cve
cve

CVE-2020-25017

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

8.3CVSS

8.1AI Score

0.001EPSS

2020-10-01 05:15 PM
41
cve
cve

CVE-2020-25018

Envoy master between 2d69e30 and 3b5acb2 may fail to parse request URL that requires host canonicalization.

7.5CVSS

7.5AI Score

0.001EPSS

2020-10-01 05:15 PM
37
cve
cve

CVE-2020-35470

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

8.8CVSS

8.5AI Score

0.001EPSS

2020-12-15 01:15 AM
52
4
cve
cve

CVE-2020-35471

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

7.5CVSS

7.5AI Score

0.002EPSS

2020-12-15 01:15 AM
63
3
cve
cve

CVE-2020-8660

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some s...

5.3CVSS

5.6AI Score

0.001EPSS

2020-03-04 10:15 PM
86
cve
cve

CVE-2020-8663

Envoy version 1.14.2, 1.13.2, 1.12.4 or earlier may exhaust file descriptors and/or memory when accepting too many connections.

7.5CVSS

7.4AI Score

0.001EPSS

2020-07-01 03:15 PM
76
cve
cve

CVE-2021-21378

Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the allow_missing requirement under r...

8.2CVSS

8.2AI Score

0.001EPSS

2021-03-11 03:15 AM
70
4
cve
cve

CVE-2021-28682

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.

7.5CVSS

7.5AI Score

0.002EPSS

2021-05-20 05:15 PM
80
4
cve
cve

CVE-2021-28683

An issue was discovered in Envoy through 1.71.1. There is a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.

7.5CVSS

7.4AI Score

0.002EPSS

2021-05-20 05:15 PM
79
4
cve
cve

CVE-2021-29258

An issue was discovered in Envoy 1.14.0. There is a remotely exploitable crash for HTTP2 Metadata, because an empty METADATA map triggers a Reachable Assertion.

7.5CVSS

7.4AI Score

0.004EPSS

2021-05-20 05:15 PM
79
2
cve
cve

CVE-2021-29492

Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences %2F and %5C in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. /something%2F..%2Fadmin, to bypass access control, e.g. a block on /admin. A ba...

8.3CVSS

8.1AI Score

0.004EPSS

2021-05-28 09:15 PM
99
9
cve
cve

CVE-2021-32777

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, o...

8.6CVSS

8.2AI Score

0.001EPSS

2021-08-24 09:15 PM
89
4
cve
cve

CVE-2021-32778

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susc...

7.5CVSS

7.3AI Score

0.001EPSS

2021-08-24 09:15 PM
72
4
cve
cve

CVE-2021-32779

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with ...

8.6CVSS

8.2AI Score

0.001EPSS

2021-08-24 09:15 PM
96
6
cve
cve

CVE-2021-32780

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions Envoy transitions a H/2 connection to the CLOSED state when it receives a GOAWAY frame without any streams outstanding. The connection state is transitioned to DRAIN...

8.6CVSS

7.5AI Score

0.001EPSS

2021-08-24 09:15 PM
76
4
cve
cve

CVE-2021-32781

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions after Envoy sends a locally generated response it must stop further processing of request or response data. However when local response is generated due the internal...

8.6CVSS

7.7AI Score

0.001EPSS

2021-08-24 09:15 PM
82
6
cve
cve

CVE-2021-39162

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted upstream servers. 0.15.1 contains an upgraded envoy binary w...

8.6CVSS

8.3AI Score

0.001EPSS

2021-09-09 10:15 PM
42
cve
cve

CVE-2021-39204

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, incorrectly handles resetting of HTTP/2 streams with excessive complexity. This can lead to high CPU utilization when a large number of streams are reset. This can result in a DoS condition. Pomerium versions...

7.5CVSS

7.3AI Score

0.001EPSS

2021-09-09 10:15 PM
35
cve
cve

CVE-2021-39206

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authoriza...

8.6CVSS

8.3AI Score

0.002EPSS

2021-09-09 11:15 PM
39
cve
cve

CVE-2021-43824

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use r...

7.5CVSS

7.1AI Score

0.001EPSS

2022-02-22 11:15 PM
93
cve
cve

CVE-2021-43825

Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data ...

7.5CVSS

7.4AI Score

0.001EPSS

2022-02-22 11:15 PM
106
cve
cve

CVE-2021-43826

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:upstream tunneling <envoy_v3_api_field_extensions.filters.network.tcp_proxy.v3.TcpProxy.tunneling_config> and the downstream connection...

7.5CVSS

7.4AI Score

0.001EPSS

2022-02-22 11:15 PM
106
cve
cve

CVE-2022-21654

Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised t...

9.8CVSS

9.1AI Score

0.002EPSS

2022-02-22 11:15 PM
114
cve
cve

CVE-2022-21655

Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redir...

7.5CVSS

7.3AI Score

0.001EPSS

2022-02-22 11:15 PM
105
cve
cve

CVE-2022-21656

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Nam...

7.4CVSS

5.7AI Score

0.001EPSS

2022-02-22 11:15 PM
115
cve
cve

CVE-2022-21657

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions Envoy does not restrict the set of certificates it accepts from the peer, either as a TLS client or a TLS server, to only those certificates that contain the necessary extendedKeyUsage (id-k...

6.8CVSS

6.5AI Score

0.001EPSS

2022-02-22 11:15 PM
112
cve
cve

CVE-2022-23606

Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle con...

6.5CVSS

6.4AI Score

0.001EPSS

2022-02-22 11:15 PM
94
cve
cve

CVE-2022-29224

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal) upstrea...

5.9CVSS

5.9AI Score

0.001EPSS

2022-06-09 07:15 PM
79
6
cve
cve

CVE-2022-29225

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 secompressors accumulate decompressed data into an intermediate buffer before overwriting the body in the decode/encodeBody. This may allow an attacker to zip bomb the decompressor by sending a small highly compressed paylo...

7.5CVSS

7.3AI Score

0.001EPSS

2022-06-09 08:15 PM
82
7
cve
cve

CVE-2022-29226

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementat...

10CVSS

9.1AI Score

0.001EPSS

2022-06-09 08:15 PM
56
7
cve
cve

CVE-2022-29227

Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local r...

7.5CVSS

7.3AI Score

0.001EPSS

2022-06-09 08:15 PM
60
7
cve
cve

CVE-2022-29228

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t eve...

7.5CVSS

7.2AI Score

0.001EPSS

2022-06-09 08:15 PM
58
5
cve
cve

CVE-2023-27487

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header x-envoy-original-path should be an internal header, but En...

9.1CVSS

9AI Score

0.002EPSS

2023-04-04 04:15 PM
128
cve
cve

CVE-2023-27488

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, escalation of privileges is possible when failure_mode_allow: true is configured for ext_authz filter. For affected components that are used for loggi...

9.8CVSS

9.3AI Score

0.003EPSS

2023-04-04 06:15 PM
129
cve
cve

CVE-2023-27491

Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests,...

9.1CVSS

8.8AI Score

0.001EPSS

2023-04-04 07:15 PM
127
cve
cve

CVE-2023-27492

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the Lua filter is vulnerable to denial of service. Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes...

6.5CVSS

6.7AI Score

0.001EPSS

2023-04-04 07:15 PM
131
cve
cve

CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to...

9.1CVSS

9.1AI Score

0.001EPSS

2023-04-04 08:15 PM
124
Total number of security vulnerabilities79