First published: Mon Jul 29 2024(Updated: )
A flaw was found in Envoy. It is possible to modify/manipulate headers from external clients when pass-through routes are used for the ingress gateway. A malicious user could use this flaw to forge what is logged by Envoy as a requested path, as well as cause the Envoy proxy to make requests to internal-only services or potentially arbitrary external systems.
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Envoy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2300352 is considered to be significant due to the potential for header manipulation and request forging.
To fix REDHAT-BUG-2300352, it is recommended to update to the latest version of Envoy which addresses this vulnerability.
Users of Envoy, particularly those using pass-through routes for the ingress gateway, are affected by REDHAT-BUG-2300352.
REDHAT-BUG-2300352 poses risks such as unauthorized request path manipulation and potential exposure to malicious activity through forged headers.
Currently, no official workaround has been provided for REDHAT-BUG-2300352 other than updating to a patched version of Envoy.