Lucene search

K
EnvoyproxyEnvoy

14 matches found

CVE
CVE
added 2021/05/28 9:15 p.m.116 views

CVE-2021-29492

Envoy is a cloud-native edge/middle/service proxy. Envoy does not decode escaped slash sequences %2F and %5C in HTTP URL paths in versions 1.18.2 and before. A remote attacker may craft a path with escaped slashes, e.g. /something%2F..%2Fadmin, to bypass access control, e.g. a block on /admin. A ba...

8.3CVSS8AI score0.07418EPSS
CVE
CVE
added 2021/08/24 9:15 p.m.112 views

CVE-2021-32777

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, o...

8.6CVSS8.5AI score0.0002EPSS
CVE
CVE
added 2021/08/24 9:15 p.m.110 views

CVE-2021-32779

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with ...

8.6CVSS8.5AI score0.00035EPSS
CVE
CVE
added 2021/08/24 9:15 p.m.96 views

CVE-2021-32781

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions after Envoy sends a locally generated response it must stop further processing of request or response data. However when local response is generated due the internal...

8.6CVSS7.8AI score0.00076EPSS
CVE
CVE
added 2021/08/24 9:15 p.m.91 views

CVE-2021-32780

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions Envoy transitions a H/2 connection to the CLOSED state when it receives a GOAWAY frame without any streams outstanding. The connection state is transitioned to DRAIN...

8.6CVSS7.8AI score0.00077EPSS
CVE
CVE
added 2021/03/11 3:15 a.m.89 views

CVE-2021-21378

Envoy is a cloud-native high-performance edge/middle/service proxy. In Envoy version 1.17.0 an attacker can bypass authentication by presenting a JWT token with an issuer that is not in the provider list when Envoy's JWT Authentication filter is configured with the allow_missing requirement under r...

8.2CVSS8.2AI score0.00233EPSS
CVE
CVE
added 2024/02/09 11:15 p.m.88 views

CVE-2024-23324

Envoy is a high-performance edge/middle/service proxy. External authentication can be bypassed by downstream connections. Downstream clients can force invalid gRPC requests to be sent to ext_authz, circumventing ext_authz checks when failure_mode_allow is set to true. This issue has been addressed ...

8.6CVSS7.4AI score0.00021EPSS
CVE
CVE
added 2019/04/25 3:29 p.m.62 views

CVE-2019-9900

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.

8.3CVSS8AI score0.00046EPSS
CVE
CVE
added 2020/12/15 1:15 a.m.62 views

CVE-2020-35470

Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).

8.8CVSS8.5AI score0.00781EPSS
CVE
CVE
added 2020/10/01 5:15 p.m.56 views

CVE-2020-25017

Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.

8.3CVSS8.1AI score0.00053EPSS
CVE
CVE
added 2023/07/25 7:15 p.m.56 views

CVE-2023-35944

Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with ...

8.2CVSS7.1AI score0.00007EPSS
CVE
CVE
added 2021/09/09 10:15 p.m.54 views

CVE-2021-39162

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, can abnormally terminate if an H/2 GOAWAY and SETTINGS frame are received in the same IO event. This can lead to a DoS in the presence of untrusted upstream servers. 0.15.1 contains an upgraded envoy binary w...

8.6CVSS8.4AI score0.00668EPSS
CVE
CVE
added 2021/09/09 11:15 p.m.53 views

CVE-2021-39206

Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authoriza...

8.6CVSS8.7AI score0.00162EPSS
CVE
CVE
added 2024/06/04 9:15 p.m.47 views

CVE-2024-23326

Envoy is a cloud-native, open source edge and service proxy. A theoretical request smuggling vulnerability exists through Envoy if a server can be tricked into adding an upgrade header into a response. Per RFC https://www.rfc-editor.org/rfc/rfc7230#section-6.7 a server sends 101 when switching prot...

8.2CVSS6.6AI score0.00043EPSS