Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy does not sanitize or escape request properties when generating request headers. This can lead to characters that are illegal in header values to be sent to the upstream service. In the worst case, it can cause upstream service to interpret the original request as two pipelined requests, possibly bypassing the intent of Envoy’s security policy. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. As a workaround, disable adding request headers based on the downstream request properties, such as downstream certificate properties.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2023-04-04T19:46:57.044Z

Updated: 2024-08-02T12:16:35.263Z

Reserved: 2023-03-01T19:03:56.634Z

Link: CVE-2023-27493

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2023-04-04T20:15:07.463

Modified: 2023-04-11T14:44:07.990

Link: CVE-2023-27493

cve-icon Redhat

Severity : Important

Publid Date: 2023-04-04T19:00:00Z

Links: CVE-2023-27493 - Bugzilla