SB2024092014 - Multiple vulnerabilities in Envoy
Published: September 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2024-45807)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper stream management when using Oghttp with the default HTTP/2 codec. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
2) Improper Output Neutralization for Logs (CVE-ID: CVE-2024-45808)
The vulnerability allows a remote attacker to inject arbitrary content into the log files.
The vulnerability exists due to insufficient validation of the REQUESTED_SERVER_NAME field. A remote attacker can inject unexpected content into access logs.
3) Input validation error (CVE-ID: CVE-2024-45806)
The vulnerability allows a remote attacker to gain unauthorized access to the application.
The vulnerability exists due to software considers all RFC1918 private address ranges as internal. A remote attacker can manipulate Envoy headers and gain unauthorized access or perform other malicious actions within the mesh.
4) NULL pointer dereference (CVE-ID: CVE-2024-45809)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in JWT filter. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.
5) Resource management error (CVE-ID: CVE-2024-45810)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the HTTP async client when handling sendLocalReply in WebSocket upgrade requests. A remote attacker can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-wqr5-qmq7-3qw3
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-qm74-x36m-555q