Duplicate of CVE-2024-45806.
History

Wed, 30 Oct 2024 02:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Mon, 30 Sep 2024 19:45:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*
Vendors & Products Envoyproxy
Envoyproxy envoy
Redhat
Redhat openshift Service Mesh
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Mon, 30 Sep 2024 19:30:00 +0000

Type Values Removed Values Added
Title Envoy: server-side request forgery via http header manipulation envoy: Server-side request forgery via HTTP header manipulation
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Sep 2024 19:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487. Duplicate of CVE-2024-45806.
CPEs cpe:/a:redhat:service_mesh:2
Vendors & Products Redhat service Mesh
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Sep 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Envoyproxy
Envoyproxy envoy
Redhat openshift Service Mesh
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*
Vendors & Products Envoyproxy
Envoyproxy envoy
Redhat openshift Service Mesh

Tue, 24 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


Tue, 24 Sep 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Fri, 20 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Sep 2024 01:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Thu, 19 Sep 2024 22:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487.
Title Envoy: server-side request forgery via http header manipulation
First Time appeared Redhat
Redhat service Mesh
Weaknesses CWE-20
CPEs cpe:/a:redhat:service_mesh:2
Vendors & Products Redhat
Redhat service Mesh
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}


cve-icon MITRE

Status: REJECTED

Assigner: redhat

Published: 2024-09-19T22:17:51.582Z

Updated: 2024-09-30T19:03:20.448Z

Reserved: 2024-07-29T12:34:41.016Z

Link: CVE-2024-7207

cve-icon Vulnrichment

Updated:

cve-icon NVD

Status : Rejected

Published: 2024-09-19T23:15:12.337

Modified: 2024-09-30T19:15:04.540

Link: CVE-2024-7207

cve-icon Redhat

Severity : Important

Publid Date: 2024-09-19T15:00:00Z

Links: CVE-2024-7207 - Bugzilla