Lucene search

K

39 matches found

CVE
CVE
added 2023/07/13 9:15 p.m.222 views

CVE-2023-35945

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy’s HTTP/2 codec may leak a header map and bookkeeping structures upon receiving RST_STREAM immediately followed by the GOAWAY frames from an upstream server. In nghttp2, cleanup of pending requests due to receipt of the GOAWAY...

7.5CVSS7.4AI score0.00128EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.153 views

CVE-2021-43826

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions of Envoy a crash occurs when configured for :ref:upstream tunneling and the downstream connection disconnects while the the upstream connection or http/2 stream is still being established. ...

7.5CVSS7.5AI score0.00095EPSS
CVE
CVE
added 2023/04/04 4:15 p.m.150 views

CVE-2023-27487

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the client may bypass JSON Web Token (JWT) checks and forge fake original paths. The header x-envoy-original-path should be an internal header, but En...

9.1CVSS8.7AI score0.00024EPSS
CVE
CVE
added 2023/04/04 7:15 p.m.149 views

CVE-2023-27492

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the Lua filter is vulnerable to denial of service. Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes...

6.5CVSS6.6AI score0.00026EPSS
CVE
CVE
added 2023/04/04 8:15 p.m.149 views

CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to...

9.1CVSS8.7AI score0.00009EPSS
CVE
CVE
added 2023/04/04 8:15 p.m.147 views

CVE-2023-27496

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a state query param is present on any response that looks like an OAuth redirect response. Sending it a request with the...

7.5CVSS7.6AI score0.00021EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.146 views

CVE-2021-43825

Envoy is an open source edge and service proxy, designed for cloud-native applications. Sending a locally generated response must stop further processing of request or response data. Envoy tracks the amount of buffered request and response data and aborts the request if the amount of buffered data ...

7.5CVSS6.8AI score0.00096EPSS
CVE
CVE
added 2023/04/04 6:15 p.m.146 views

CVE-2023-27488

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, escalation of privileges is possible when failure_mode_allow: true is configured for ext_authz filter. For affected components that are used for loggi...

9.8CVSS7.5AI score0.00021EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.145 views

CVE-2022-21655

Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redir...

7.5CVSS7.4AI score0.00122EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.142 views

CVE-2021-43824

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions a crafted request crashes Envoy when a CONNECT request is sent to JWT filter configured with regex match. This provides a denial of service attack vector. The only workaround is to not use r...

7.5CVSS7.2AI score0.00125EPSS
CVE
CVE
added 2023/04/04 7:15 p.m.140 views

CVE-2023-27491

Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests,...

9.1CVSS6.9AI score0.00013EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.130 views

CVE-2022-21656

Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Nam...

7.4CVSS6AI score0.00017EPSS
CVE
CVE
added 2022/02/22 11:15 p.m.128 views

CVE-2022-21657

Envoy is an open source edge and service proxy, designed for cloud-native applications. In affected versions Envoy does not restrict the set of certificates it accepts from the peer, either as a TLS client or a TLS server, to only those certificates that contain the necessary extendedKeyUsage (id-k...

6.8CVSS6.6AI score0.00039EPSS
CVE
CVE
added 2021/05/28 9:15 p.m.120 views

CVE-2021-29492

Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences %2F and %5C in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. /something%2F..%2Fadmin, to bypass access control, e.g. a block on /admin. A ba...

8.3CVSS8AI score0.07418EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.115 views

CVE-2022-29225

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 secompressors accumulate decompressed data into an intermediate buffer before overwriting the body in the decode/encodeBody. This may allow an attacker to zip bomb the decompressor by sending a small highly compressed paylo...

7.5CVSS8.3AI score0.00027EPSS
CVE
CVE
added 2022/06/09 7:15 p.m.111 views

CVE-2022-29224

Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal) upstrea...

5.9CVSS7.2AI score0.00784EPSS
CVE
CVE
added 2024/04/04 8:15 p.m.110 views

CVE-2024-30255

Envoy is a cloud-native, open source edge and service proxy. The HTTP/2 protocol stack in Envoy versions prior to 1.29.3, 1.28.2, 1.27.4, and 1.26.8 are vulnerable to CPU exhaustion due to flood of CONTINUATION frames. Envoy's HTTP/2 codec allows the client to send an unlimited number of CONTINUATI...

7.5CVSS5.5AI score0.90992EPSS
CVE
CVE
added 2020/03/04 10:15 p.m.107 views

CVE-2020-8660

CNCF Envoy through 1.13.0 TLS inspector bypass. TLS inspector could have been bypassed (not recognized as a TLS client) by a client using only TLS 1.3. Because TLS extensions (SNI, ALPN) were not inspected, those connections might have been matched to a wrong filter chain, possibly bypassing some s...

5.3CVSS5.6AI score0.00025EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.99 views

CVE-2024-45810

Envoy is a cloud-native high-performance edge/middle/service proxy. Envoy will crash when the http async client is handling sendLocalReply under some circumstance, e.g., websocket upgrade, and requests mirroring. The http async client will crash during the sendLocalReply() in http async client, one...

7.5CVSS7AI score0.00046EPSS
CVE
CVE
added 2025/03/21 3:15 p.m.92 views

CVE-2025-30157

Envoy is a cloud-native high-performance edge/middle/service proxy. Prior to 1.33.1, 1.32.4, 1.31.6, and 1.30.10, Envoy's ext_proc HTTP filter is at risk of crashing if a local reply is sent to the external server due to the filter's life time issue. A known situation is the failure of a websocket ...

7.5CVSS6.3AI score0.00004EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.90 views

CVE-2022-29228

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t eve...

7.5CVSS8.3AI score0.00425EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.90 views

CVE-2024-45806

Envoy is a cloud-native high-performance edge/middle/service proxy. A security vulnerability in Envoy allows external clients to manipulate Envoy headers, potentially leading to unauthorized access or other malicious actions within the mesh. This issue arises due to Envoy's default configuration of...

6.5CVSS6.8AI score0.00331EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.87 views

CVE-2022-29226

Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementat...

10CVSS9.4AI score0.00067EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.79 views

CVE-2020-35471

Envoy before 1.16.1 mishandles dropped and truncated datagrams, as demonstrated by a segmentation fault for a UDP packet size larger than 1500.

7.5CVSS7.5AI score0.00069EPSS
CVE
CVE
added 2024/12/18 8:15 p.m.77 views

CVE-2024-53270

Envoy is a cloud-native high-performance edge/middle/service proxy. In affected versions sendOverloadError is going to assume the active request exists when envoy.load_shed_points.http1_server_abort_dispatch is configured. If active_request is nullptr, only onMessageBeginImpl() is called. However, ...

7.5CVSS7.4AI score0.00011EPSS
CVE
CVE
added 2020/07/14 10:15 p.m.73 views

CVE-2020-15104

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would incorrectly allow nested.subdomain.example.com, whe...

5.5CVSS5.2AI score0.00116EPSS
CVE
CVE
added 2022/06/09 8:15 p.m.73 views

CVE-2022-29227

Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local r...

7.5CVSS8.3AI score0.00332EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.66 views

CVE-2020-35470

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

8.8CVSS8.5AI score0.00781EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.59 views

CVE-2020-25017

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

8.3CVSS8.1AI score0.00053EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.58 views

CVE-2024-23326

Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching prot...

8.2CVSS6.6AI score0.00043EPSS
CVE
CVE
added 2024/09/20 12:15 a.m.58 views

CVE-2024-45808

Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the REQUESTED_SERVER_NAME field for access logger...

6.5CVSS6.7AI score0.00027EPSS
CVE
CVE
added 2021/09/09 10:15 p.m.55 views

CVE-2021-39162

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted upstream servers. 0.15.1 contains an upgraded envoy binary w...

8.6CVSS8.4AI score0.00668EPSS
CVE
CVE
added 2021/09/09 11:15 p.m.54 views

CVE-2021-39206

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authoriza...

8.6CVSS8.7AI score0.00162EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.50 views

CVE-2024-34364

Envoy is a cloud-native, open source edge and service proxy. Envoy exposed an out-of-memory (OOM) vector from the mirror response, since async HTTP client will buffer the response with an unbounded buffer.

6.5CVSS6.3AI score0.00023EPSS
CVE
CVE
added 2025/05/07 10:15 p.m.49 views

CVE-2025-46821

Envoy is a cloud-native edge/middle/service proxy. Prior to versions 1.34.1, 1.33.3, 1.32.6, and 1.31.8, Envoy's URI template matcher incorrectly excludes the * character from a set of valid characters in the URI path. As a result URI path containing the * character will not match a URI template ex...

5.3CVSS5.1AI score0.0001EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.30 views

CVE-2024-32974

Envoy is a cloud-native, open source edge and service proxy. A crash was observed in EnvoyQuicServerStream::OnInitialHeadersComplete() with following call stack. It is a use-after-free caused by QUICHE continuing push request headers after StopReading() being called on the stream. As after StopRead...

7.5CVSS6.6AI score0.00024EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.24 views

CVE-2024-32975

Envoy is a cloud-native, open source edge and service proxy. There is a crash at QuicheDataReader::PeekVarInt62Length(). It is caused by integer underflow in the QuicStreamSequencerBuffer::PeekRegion() implementation.

7.5CVSS6.5AI score0.00028EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.20 views

CVE-2024-34362

Envoy is a cloud-native, open source edge and service proxy. There is a use-after-free in HttpConnectionManager (HCM) with EnvoyQuicServerStream that can crash Envoy. An attacker can exploit this vulnerability by sending a request without FIN, then a RESET_STREAM frame, and then after receiving the...

5.9CVSS6AI score0.00018EPSS
CVE
CVE
added 2025/09/03 8:15 p.m.5 views

CVE-2025-55162

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In versions below 1.32.10 and 1.33.0 through 1.33.6, 1.34.0 through 1.34.4 and 1.35.0, insufficient Session Expiration in the Envoy OAuth2 filter leads to failed logout operations. When ...

8.8CVSS6.3AI score0.00006EPSS