Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1449 Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
Github GHSA Github GHSA GHSA-2h44-x2wx-49f4 Potential HTTP policy bypass when using header rules in Cilium
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 16 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-16T19:15:24.959Z

Reserved: 2023-04-18T16:13:15.881Z

Link: CVE-2023-30851

cve-icon Vulnrichment

Updated: 2024-08-02T14:37:15.467Z

cve-icon NVD

Status : Modified

Published: 2023-05-25T18:15:10.240

Modified: 2024-11-21T08:00:58.323

Link: CVE-2023-30851

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.