
Cloud Vulnerability DB
A community-led vulnerabilities database
Envoy, an open source edge and service proxy designed for cloud-native applications, was found to have a vulnerability (CVE-2023-27491) where non-compliant HTTP/1 services may allow malformed requests. This vulnerability affects versions prior to 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, potentially leading to a bypass of security policies. The issue has been fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 (GitHub Advisory).
The vulnerability stems from Envoy's failure to reject HTTP/2 and HTTP/3 requests with invalid :method values that don't conform to valid tokens as defined in RFC specifications. According to HTTP/2 and HTTP/3 standards, requests must include exactly one value for the :method, :scheme, and :path pseudo-header fields, unless it's a CONNECT request. The presence of invalid characters in pseudo headers can result in sending an invalid request line when proxying from HTTP/2 or HTTP/3 client to HTTP/1 upstream service. The vulnerability has been assigned a CVSS v3.1 base score of 5.4 (Medium) (GitHub Advisory).
The vulnerability could allow attackers to bypass security policies by sending specifically crafted HTTP/2 or HTTP/3 requests that trigger parsing errors on HTTP/1 upstream services. This could potentially lead to unauthorized access or privilege escalation if the malformed requests are processed by non-compliant HTTP/1 services (GitHub Advisory).
The vulnerability has been fixed in Envoy versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9. Users should upgrade to these patched versions to mitigate the security risk (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."