First published: Thu Jan 23 2025(Updated: )
### Impact A user with access to a Kubernetes cluster where Envoy Gateway is installed can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by Envoy Gateway. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). For example, the following command, if run from within the Kubernetes cluster, can be used to get the configuration dump of the proxy: ``` curl --path-as-is http://<Proxy-Service-ClusterIP>:19001/stats/prometheus/../../config_dump ``` ### Patches 1.2.6 ### Workarounds The `EnvoyProxy` API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch. ``` apiVersion: gateway.envoyproxy.io/v1alpha1 kind: EnvoyProxy metadata: name: custom-proxy-config namespace: default spec: bootstrap: type: JSONPatch jsonPatches: - op: "add" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/normalize_path" value: true - op: "replace" path: "/static_resources/listeners/0/filter_chains/0/filters/0/typed_config/route_config/virtual_hosts/0/routes/0/match" value: path: "/stats/prometheus" headers: - name: ":method" exact_match: GET ``` ### References - Envoy Admin Interface: https://www.envoyproxy.io/docs/envoy/latest/operations/admin - Envoy Configuration Best Practices: https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/envoyproxy/gateway | <1.2.6 | 1.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-j777-63hf-hx76 is classified as critical due to its potential to allow unauthorized access to the Envoy Admin interface.
To fix GHSA-j777-63hf-hx76, upgrade the Envoy Gateway to version 1.2.6 or later.
GHSA-j777-63hf-hx76 allows for a path traversal attack that can execute commands on the Envoy Admin interface.
Kubernetes clusters using vulnerable versions of Envoy Gateway are affected by GHSA-j777-63hf-hx76.
An attacker could extract the Envoy configuration and possibly terminate the Envoy process using GHSA-j777-63hf-hx76.