CVE Vulnerabilities

CVE-2019-18802

Published: Dec 13, 2019 | Modified: Nov 07, 2023
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat header-value as a different string from header-value so for example with the Host header example.com one could bypass example.com matchers.

Affected Software

Name Vendor Start Version End Version
Envoy Envoyproxy * 1.12.1 (including)
Openshift Service Mesh 1.0 RedHat kiali-0:v1.0.8.redhat1-1.el7 *
OpenShift Service Mesh 1.0 RedHat servicemesh-0:1.0.3-1.el8 *
OpenShift Service Mesh 1.0 RedHat servicemesh-cni-0:1.0.3-1.el8 *
OpenShift Service Mesh 1.0 RedHat servicemesh-grafana-0:6.2.2-25.el8 *
OpenShift Service Mesh 1.0 RedHat servicemesh-operator-0:1.0.3-1.el8 *
OpenShift Service Mesh 1.0 RedHat servicemesh-prometheus-0:2.7.2-26.el8 *
OpenShift Service Mesh 1.0 RedHat servicemesh-proxy-0:1.0.3-1.el8 *

References