CVE-2019-18802

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one could bypass "example.com" matchers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

07 Nov 2023, 03:07

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!forum/envoy-users', 'name': 'https://groups.google.com/forum/#!forum/envoy-users', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://groups.google.com/forum/#%21forum/envoy-usersĀ -

Information

Published : 2019-12-13 13:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-18802

Mitre link : CVE-2019-18802

CVE.ORG link : CVE-2019-18802


JSON object : View

Products Affected

envoyproxy

  • envoy