First published: Tue Apr 09 2019(Updated: )
A flaw was found in Envoy 1.9.0 and older. Envoy does not normalize HTTP URL paths. A remote attacker may craft a path with a relative path, e.g. something/../admin, to bypass access control, e.g. a block on /admin. A backend server could then interpret the unnormalized path and provide an attacker access beyond the scope provided for by the access control policy. Upstream issue: <a href="https://github.com/envoyproxy/envoy/issues/6435">https://github.com/envoyproxy/envoy/issues/6435</a> References: <a href="https://istio.io/blog/2019/announcing-1.1.2/">https://istio.io/blog/2019/announcing-1.1.2/</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Envoy | <1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-1698025 is considered high severity due to its potential for unauthorized access.
REDHAT-BUG-1698025 affects Envoy servers by allowing attackers to bypass access controls through unnormalized HTTP URL paths.
To fix REDHAT-BUG-1698025, upgrade to Envoy version 1.9.1 or later where the vulnerability is addressed.
Any organization using Envoy versions 1.9.0 or older is at risk of exploitation due to REDHAT-BUG-1698025.
The exploitation in REDHAT-BUG-1698025 involves remotely crafting HTTP requests with relative paths to bypass access controls.