Search for vulnerabilities
Vulnerability details: VCID-w5ct-jkjq-aaak
Vulnerability ID VCID-w5ct-jkjq-aaak
Aliases CVE-2021-39155
GHSA-7774-7vr3-cc8j
Summary Istio is an open source platform for providing a uniform way to integrate microservices, manage traffic flow across microservices, enforce policies and aggregate telemetry data. According to [RFC 4343](https://datatracker.ietf.org/doc/html/rfc4343), Istio authorization policy should compare the hostname in the HTTP Host header in a case insensitive way, but currently the comparison is case sensitive. The proxy will route the request hostname in a case-insensitive way which means the authorization policy could be bypassed. As an example, the user may have an authorization policy that rejects request with hostname "httpbin.foo" for some source IPs, but the attacker can bypass this by sending the request with hostname "Httpbin.Foo". Patches are available in Istio 1.11.1, Istio 1.10.4 and Istio 1.9.8. As a work around a Lua filter may be written to normalize Host header before the authorization check. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2021:3272
rhas Important https://access.redhat.com/errata/RHSA-2021:3273
cvssv3 8.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39155.json
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00131 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00140 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00211 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
epss 0.00442 https://api.first.org/data/v1/epss?cve=CVE-2021-39155
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1996929
cvssv3.1 8.3 https://datatracker.ietf.org/doc/html/rfc4343
generic_textual HIGH https://datatracker.ietf.org/doc/html/rfc4343
cvssv3.1 7.6 https://github.com/istio/istio
generic_textual HIGH https://github.com/istio/istio
cvssv3.1 8.3 https://github.com/istio/istio/commit/084b417a486dbe9b9024d4812877016a484572b1
generic_textual HIGH https://github.com/istio/istio/commit/084b417a486dbe9b9024d4812877016a484572b1
cvssv3.1 8.3 https://github.com/istio/istio/commit/76ed51413ddd2a7fa253a368ab20a9cec5fb1cbe
generic_textual HIGH https://github.com/istio/istio/commit/76ed51413ddd2a7fa253a368ab20a9cec5fb1cbe
cvssv3.1 8.3 https://github.com/istio/istio/commit/90b00bdf891e6c770cb3235c14a9b1fda96cc7c5
generic_textual HIGH https://github.com/istio/istio/commit/90b00bdf891e6c770cb3235c14a9b1fda96cc7c5
cvssv3.1 8.3 https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j
generic_textual HIGH https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2021-39155
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-39155
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-39155
archlinux High https://security.archlinux.org/AVG-2321
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-39155.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L Found at https://datatracker.ietf.org/doc/html/rfc4343
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N Found at https://github.com/istio/istio
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L Found at https://github.com/istio/istio/commit/084b417a486dbe9b9024d4812877016a484572b1
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L Found at https://github.com/istio/istio/commit/76ed51413ddd2a7fa253a368ab20a9cec5fb1cbe
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L Found at https://github.com/istio/istio/commit/90b00bdf891e6c770cb3235c14a9b1fda96cc7c5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L Found at https://github.com/istio/istio/security/advisories/GHSA-7774-7vr3-cc8j
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39155
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39155
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2021-39155
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.29623
EPSS Score 0.00131
Published At April 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.