Lucene search

K
veracodeVeracode Vulnerability DatabaseVERACODE:46551
HistoryApr 21, 2024 - 6:59 p.m.

Incorrect Check Of Function Return Value

2024-04-2118:59:34
Veracode Vulnerability Database
sca.analysiscenter.veracode.com
2
envoy
vulnerability
input validation
host headers
abnormal termination
tls cluster
availability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Envoy is vulnerable to Incorrect Check of Function Return Value. The vulnerability is due to insufficient input validation, which triggers an abnormal termination of the Envoy process when handling requests with overly long (longer than 255 characters) host/:authority headers (or alternate header configured via override_auto_sni_header), when an upstream TLS cluster is used with auto_sni enabled. This leads to compromising availability of the system.

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for VERACODE:46551