First published: Thu Mar 16 2023(Updated: )
The header x-envoy-original-path should be an internal header, but Envoy does not remove this header from the request at the beginning of request processing when it is sent from an untrusted client. The faked header would then be used for trace logs and grpc logs, as well as used in the URL used for jwt_authn checks if the jwt_authn filter is used, and any other upstream use of the x-envoy-original-path header.
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Proxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2179135 is classified as high due to potential impact on application security.
To fix REDHAT-BUG-2179135, ensure that you update Envoy to the latest patched version that addresses the vulnerability.
The risks associated with REDHAT-BUG-2179135 include exposure of sensitive information and potential exploitation by malicious actors.
REDHAT-BUG-2179135 affects several versions of Envoy, so all instances should be evaluated for risk.
A temporary workaround for REDHAT-BUG-2179135 involves removing the x-envoy-original-path header from requests if possible.