Improper Authentication in Istio - CVE-2020-8595
Published: February 17, 2020
Istio
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in the Authentication Policy exact-path matching logic. A remote attacker can bypass authentication process and gain unauthorized access to HTTP paths even if they are configured to be only accessed after presenting a valid JWT token.