First published: Tue Jun 27 2023(Updated: )
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Envoyproxy Envoy | >=1.23.0<1.23.12 | |
Envoyproxy Envoy | >=1.24.0<1.24.10 | |
Envoyproxy Envoy | >=1.25.0<1.25.9 | |
Envoyproxy Envoy | >=1.26.0<1.26.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35943 is a vulnerability in Envoy proxy prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 that can cause a crash when the `origin` header is removed between `decodeHeaders` and `encodeHeaders`.
CVE-2023-35943 has a severity rating of high with a score of 7.5.
CVE-2023-35943 affects Envoy proxy versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12.
To mitigate the CVE-2023-35943 vulnerability, users should update to a version of Envoy proxy that is not affected by the vulnerability.
You can find more information about CVE-2023-35943 on the official Envoyproxy Envoy GitHub security advisories page and the Red Hat security advisories page.