Search for vulnerabilities
Vulnerability ID | VCID-wz85-a7wk-aaaj |
Aliases |
CVE-2023-35944
|
Summary | Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as `htTp` or `htTps`, or the bypassing of some requests such as `https` in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 7.4 |
Risk | 3.7 |
Affected and Fixed Packages | Package Details |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35944.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2023-35944 | ||
https://github.com/envoyproxy/envoy/security/advisories/GHSA-pvgm-7jpg-pw5g | ||
2217985 | https://bugzilla.redhat.com/show_bug.cgi?id=2217985 | |
cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
CVE-2023-35944 | https://nvd.nist.gov/vuln/detail/CVE-2023-35944 | |
ISTIO-SECURITY-2023-003 | https://istio.io/latest/news/security/ISTIO-SECURITY-2023-003/ | |
RHSA-2023:4624 | https://access.redhat.com/errata/RHSA-2023:4624 | |
RHSA-2023:4625 | https://access.redhat.com/errata/RHSA-2023:4625 | |
RHSA-2023:5175 | https://access.redhat.com/errata/RHSA-2023:5175 |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
Percentile | 0.23449 |
EPSS Score | 0.00053 |
Published At | Dec. 17, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |