漏洞标题
在路由哈希策略配置了cookie属性时,Envoy Proxy使用后释放(use after free)漏洞
漏洞描述信息
Envoy是一个云原生、开源边缘和服务代理。在版本1.30.4、1.29.7、1.28.5和1.27.7之前,当路由哈希策略配置为使用cookie属性时,Envoy已经引用并释放了已分配的内存。请注意,此漏洞已经在开源中被修复,因为如果配置了,其影响会立即显现。在解析配置后,用于存储属性值的内存会被释放。在处理请求时,Envoy将尝试将已分配内存的内容复制到请求的cookie头部。这可能导致Envoy内存的任意内容被发送到上游服务,或者导致进程异常终止。此漏洞在Envoy版本v1.30.4、v1.29.7、v1.28.5和v1.27.7中已得到修复。作为临时解决方案,不要在路由动作哈希策略中使用cookie属性。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
漏洞类别
释放后使用
漏洞标题
Envoy Proxy use after free when route hash policy is configured with cookie attributes
漏洞描述信息
Envoy is a cloud-native, open source edge and service proxy. Prior to versions 1.30.4, 1.29.7, 1.28.5, and 1.27.7. Envoy references already freed memory when route hash policy is configured with cookie attributes. Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured. Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination. This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5, and v1.27.7. As a workaround, do not use cookie attributes in route action hash policy.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
漏洞类别
释放后使用
漏洞标题
Envoy 安全漏洞
漏洞描述信息
Envoy是一款开源的分布式代理服务器。 Envoy 1.30.4、1.29.7、1.28.5和1.27.7之前版本存在安全漏洞,该漏洞源于在配置路由哈希策略时使用cookie属性时引用了已经被释放的内存,导致Envoy内存的任意内容被发送到上游服务或进程异常终止。
CVSS信息
N/A
漏洞类别
其他