Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-31256 Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 11 Feb 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-02-11T16:14:43.908Z

Reserved: 2023-03-01T19:03:56.634Z

Link: CVE-2023-27491

cve-icon Vulnrichment

Updated: 2024-08-02T12:16:35.377Z

cve-icon NVD

Status : Modified

Published: 2023-04-04T19:15:07.150

Modified: 2024-11-21T07:53:00.813

Link: CVE-2023-27491

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-04-04T19:00:00Z

Links: CVE-2023-27491 - Bugzilla

cve-icon OpenCVE Enrichment

No data.