Metrics
Affected Vendors & Products
Wed, 30 Oct 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 30 Sep 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Envoyproxy
Envoyproxy envoy Redhat Redhat openshift Service Mesh |
|
References |
|
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 30 Sep 2024 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | Envoy: server-side request forgery via http header manipulation | envoy: Server-side request forgery via HTTP header manipulation |
Metrics |
ssvc
|
Mon, 30 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487. | Duplicate of CVE-2024-45806. |
CPEs | ||
Vendors & Products |
Redhat service Mesh
|
|
Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 25 Sep 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Envoyproxy
Envoyproxy envoy Redhat openshift Service Mesh |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Envoyproxy
Envoyproxy envoy Redhat openshift Service Mesh |
Tue, 24 Sep 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Sep 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 20 Sep 2024 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 19 Sep 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487. | |
Title | Envoy: server-side request forgery via http header manipulation | |
First Time appeared |
Redhat
Redhat service Mesh |
|
Weaknesses | CWE-20 | |
CPEs | cpe:/a:redhat:service_mesh:2 | |
Vendors & Products |
Redhat
Redhat service Mesh |
|
References |
| |
Metrics |
cvssV3_1
|
Status: REJECTED
Assigner: redhat
Published: 2024-09-19T22:17:51.582Z
Updated: 2024-09-30T19:03:20.448Z
Reserved: 2024-07-29T12:34:41.016Z
Link: CVE-2024-7207
Updated:
Status : Rejected
Published: 2024-09-19T23:15:12.337
Modified: 2024-09-30T19:15:04.540
Link: CVE-2024-7207