CVE-2023-35941

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

History

02 Aug 2023, 18:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Envoyproxy envoy
Envoyproxy
References (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 - (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55 - Third Party Advisory
CPE cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*

25 Jul 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-25 18:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-35941

Mitre link : CVE-2023-35941

CVE.ORG link : CVE-2023-35941


JSON object : View

Products Affected

envoyproxy

  • envoy
CWE
CWE-116

Improper Encoding or Escaping of Output