First published: Tue Feb 04 2020(Updated: )
Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 allows authentication bypass. The Authentication Policy exact-path matching logic can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token. For example, an attacker can add a ? or # character to a URI that would otherwise satisfy an exact-path match.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/istio | <1.3.8 | 1.3.8 |
redhat/istio | <1.4.4 | 1.4.4 |
Istio Istio | >=1.3<=1.3.7 | |
Istio Istio | >=1.4.0<=1.4.3 | |
Redhat Openshift Service Mesh | =1.0 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8595 is a vulnerability in Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 that allows authentication bypass.
The severity of CVE-2020-8595 is high, with a severity value of 7.3.
CVE-2020-8595 allows authentication bypass through the Authentication Policy exact-path matching logic, which can allow unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token.
Istio versions 1.2.10 (End of Life) and prior, 1.3 through 1.3.7, and 1.4 through 1.4.3 are affected by CVE-2020-8595.
To fix CVE-2020-8595, upgrade to Istio version 1.3.8 or higher if you are using versions 1.3 through 1.3.7, or upgrade to version 1.4.4 or higher if you are using versions 1.4 through 1.4.3.