First published: Fri Sep 20 2024(Updated: )
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Envoy Envoy | <1.31.2<1.30.6<1.29.9<1.28.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2313685 is categorized as a medium risk due to the potential for log injection by attackers.
To fix REDHAT-BUG-2313685, upgrade Envoy to a version greater than 1.31.2, 1.30.6, 1.29.9, or 1.28.7.
Envoy versions up to 1.31.2, 1.30.6, 1.29.9, and 1.28.7 are affected by REDHAT-BUG-2313685.
REDHAT-BUG-2313685 facilitates log injection attacks, allowing malicious content to be introduced into access logs.
There is no official workaround for REDHAT-BUG-2313685; upgrading to a secure version is advised.