CVE-2023-27493

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

11 Apr 2023, 14:44

Type Values Removed Values Added
References (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q - (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-w5w5-487h-qv8q - Exploit, Vendor Advisory
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
First Time Envoyproxy
Envoyproxy envoy
CWE CWE-20 CWE-444

04 Apr 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-04 20:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-27493

Mitre link : CVE-2023-27493

CVE.ORG link : CVE-2023-27493


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

CWE-20

Improper Input Validation