Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 30 Oct 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 30 Sep 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Envoyproxy
Envoyproxy envoy Redhat Redhat openshift Service Mesh |
|
| References |
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 30 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Envoy: server-side request forgery via http header manipulation | envoy: Server-side request forgery via HTTP header manipulation |
| Metrics |
ssvc
|
Mon, 30 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487. | Duplicate of CVE-2024-45806. |
| CPEs | ||
| Vendors & Products |
Redhat service Mesh
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 25 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Envoyproxy
Envoyproxy envoy Redhat openshift Service Mesh |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Envoyproxy
Envoyproxy envoy Redhat openshift Service Mesh |
Tue, 24 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Sep 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 20 Sep 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Sep 2024 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 19 Sep 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487. | |
| Title | Envoy: server-side request forgery via http header manipulation | |
| First Time appeared |
Redhat
Redhat service Mesh |
|
| Weaknesses | CWE-20 | |
| CPEs | cpe:/a:redhat:service_mesh:2 | |
| Vendors & Products |
Redhat
Redhat service Mesh |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: REJECTED
Assigner: redhat
Published:
Updated: 2024-09-30T19:03:20.448Z
Reserved: 2024-07-29T12:34:41.016Z
Link: CVE-2024-7207
Updated:
Status : Rejected
Published: 2024-09-19T23:15:12.337
Modified: 2024-09-30T19:15:04.540
Link: CVE-2024-7207
OpenCVE Enrichment
No data.