CVE-2024-45809

Sept. 20, 2024, 12:30 p.m.

Undergoing Analysis
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Envoy Proxy

  • 1.31.2
  • 1.30.6
  • 1.29.9

Source

security-advisories@github.com

Tags

CVE-2024-45809 details

Published : Sept. 20, 2024, 12:15 a.m.
Last Modified : Sept. 20, 2024, 12:30 p.m.

Description

Envoy is a cloud-native high-performance edge/middle/service proxy. Jwt filter will lead to an Envoy crash when clear route cache with remote JWKs. In the following case: 1. remote JWKs are used, which requires async header processing; 2. clear_route_cache is enabled on the provider; 3. header operations are enabled in JWT filter, e.g. header to claims feature; 4. the routing table is configured in a way that the JWT header operations modify requests to not match any route. When these conditions are met, a crash is triggered in the upstream code due to nullptr reference conversion from route(). The root cause is the ordering of continueDecoding and clearRouteCache. This issue has been addressed in versions 1.31.2, 1.30.6, and 1.29.9. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS Score

1 2 3 4 5.3 6 7 8 9 10

Weakness

Weakness Name Description
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

5.3

Exploitability Score

1.6

Impact Score

3.6

Base Severity

MEDIUM

References

URL Source
https://github.com/envoyproxy/envoy/security/advisories/GHSA-wqr5-qmq7-3qw3 security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.