CVE Vulnerabilities

CVE-2019-18802

Published: Dec 13, 2019 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat header-value as a different string from header-value so for example with the Host header example.com one could bypass example.com matchers.

Affected Software

NameVendorStart VersionEnd Version
EnvoyEnvoyproxy*1.12.1 (including)
Openshift Service Mesh 1.0RedHatkiali-0:v1.0.8.redhat1-1.el7*
OpenShift Service Mesh 1.0RedHatservicemesh-0:1.0.3-1.el8*
OpenShift Service Mesh 1.0RedHatservicemesh-cni-0:1.0.3-1.el8*
OpenShift Service Mesh 1.0RedHatservicemesh-grafana-0:6.2.2-25.el8*
OpenShift Service Mesh 1.0RedHatservicemesh-operator-0:1.0.3-1.el8*
OpenShift Service Mesh 1.0RedHatservicemesh-prometheus-0:2.7.2-26.el8*
OpenShift Service Mesh 1.0RedHatservicemesh-proxy-0:1.0.3-1.el8*

References