Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2024, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-116 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
| References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc - Vendor Advisory | |
| First Time |
Envoyproxy envoy
Envoyproxy |
20 Sep 2024, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-20 00:15
Updated : 2024-09-25 17:18
NVD link : CVE-2024-45808
Mitre link : CVE-2024-45808
JSON object : View
Products Affected
envoyproxy
- envoy
CWE
CWE-116
Improper Encoding or Escaping of Output
