First published: Fri Jan 19 2024(Updated: )
Envoy incorrectly accepts HTTP 200 response for entering upgrade mode
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/envoy | <1.30.2 | 1.30.2 |
redhat/envoy | <1.29.5 | 1.29.5 |
redhat/envoy | <1.27.6 | 1.27.6 |
Envoy Proxy | <1.27.6 | |
Envoy Proxy | >=1.28.0<1.28.4 | |
Envoy Proxy | >=1.29.0<1.29.5 | |
Envoy Proxy | >=1.30.0<1.30.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23326 has been assigned a risk rating indicating potential vulnerability in Envoy proxy that could allow HTTP request smuggling.
To fix CVE-2024-23326, upgrade your Envoy proxy to version 1.27.6, 1.29.5, or 1.30.2.
CVE-2024-23326 affects Envoy versions up to 1.30.1, 1.29.4, and 1.27.5.
Yes, CVE-2024-23326 can potentially impact production environments by allowing unauthorized HTTP request smuggling.
As of now, there are no known exploitations reported for CVE-2024-23326.