First published: Mon Mar 27 2023(Updated: )
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a `state` query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the `state` parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | <1.22.9 | |
Envoyproxy Envoy | >=1.23.0<1.23.6 | |
Envoyproxy Envoy | >=1.24.0<1.24.4 | |
Envoyproxy Envoy | >=1.25.0<1.25.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27496 is a vulnerability in Envoy, an open-source edge and service proxy, that allows an attacker to bypass OAuth security measures.
CVE-2023-27496 has a severity value of 7.5, which is considered high.
CVE-2023-27496 affects Envoy versions 1.22.9, 1.23.0 to 1.23.6, 1.24.0 to 1.24.4, and 1.25.0 to 1.25.3 by assuming the presence of a `state` query parameter on OAuth redirect responses.
An attacker can exploit CVE-2023-27496 by sending a request without the expected `state` query parameter to bypass OAuth security measures.
To mitigate CVE-2023-27496, upgrade Envoy to version 1.22.9, 1.23.6, 1.24.4, 1.25.3, or newer.