First published: Wed Jan 19 2022(Updated: )
Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Istio Istio | =1.12.0 | |
Istio Istio | =1.12.0-alpha0 | |
Istio Istio | =1.12.0-alpha1 | |
Istio Istio | =1.12.0-alpha5 | |
Istio Istio | =1.12.0-beta0 | |
Istio Istio | =1.12.0-beta1 | |
Istio Istio | =1.12.0-beta2 | |
Istio Istio | =1.12.0-rc1 | |
Istio Istio | =1.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Istio vulnerability is CVE-2022-21679.
Istio is an open platform to connect, manage, and secure microservices.
The severity of CVE-2022-21679 is critical.
CVE-2022-21679 affects Istio versions 1.12.0 and 1.12.1.
To fix CVE-2022-21679, you should upgrade your Istio installation to version 1.12.2 or higher.