First published: Thu Mar 16 2023(Updated: )
Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | <1.22.9 | |
Envoyproxy Envoy | >=1.23.0<1.23.6 | |
Envoyproxy Envoy | >=1.24.0<1.24.4 | |
Envoyproxy Envoy | >=1.25.0<1.25.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27491 is a vulnerability in Envoy, an open source edge and service proxy, where non-compliant HTTP/1 services may allow malformed requests, potentially leading to security issues.
CVE-2023-27491 has a severity score of 9.1, which is considered critical.
Envoy versions prior to 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 are affected by CVE-2023-27491.
To fix CVE-2023-27491, you should update Envoy to version 1.26.0, 1.25.3, 1.24.4, 1.23.6, or 1.22.9, or newer.
More information about CVE-2023-27491 can be found at the following references: [link1], [link2], [link3].