First published: Thu Jan 23 2025(Updated: )
### Impact A user with access to a Kubernetes cluster where Envoy Gateway is installed can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by Envoy Gateway. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). For example, the following command, if run from within the Kubernetes cluster, can be used to get the configuration dump of the proxy: ``` curl --path-as-is http://<Proxy-Service-ClusterIP>:19001/stats/prometheus/../../config_dump ``` ### Patches 1.2.6 ### Workarounds The `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch. ``` apiVersion: gateway.envoyproxy.io/v1alpha1 kind: EnvoyProxy metadata: name: custom-proxy-config namespace: default spec: bootstrap: type: JSONPatch jsonPatches: - op: "add" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/normalize_path" value: true - op: "replace" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/route_config/virtual_hosts/0/routes/0/match" value: path: "/stats/prometheus" headers: - name: ":method" exact_match: GET ``` ### References - Envoy Admin Interface: https://www.envoyproxy.io/docs/envoy/latest/operations/admin - Envoy Configuration Best Practices: https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/envoyproxy/gateway | <1.2.6 | 1.2.6 |
Envoy Proxy | <1.2.6 | |
Envoy Proxy | <1.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2025-24030 is considered high severity due to its potential impact on the Envoy Admin interface.
To mitigate CVE-2025-24030, users should upgrade Envoy Gateway to version 1.2.6 or later.
CVE-2025-24030 enables a path traversal attack that allows unauthorized access to Envoy Admin interface commands.
Any user with access to a Kubernetes cluster running an affected version of Envoy Gateway is at risk with CVE-2025-24030.
An attacker exploiting CVE-2025-24030 can terminate the Envoy process and extract sensitive information from the Envoy configuration.