Bug 1996934 (CVE-2021-32779)

Summary: CVE-2021-32779 envoyproxy/envoy: HTTP request with a URL fragment in the URI can bypass authorization policies
Product: [Other] Security Response Reporter: Mark Cooper <mcooper>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: jwendell, kconner, rcernich, security-response-team, twalsh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: envoyproxy/envoy 1.19.1, envoyproxy/envoy 1.18.4, envoyproxy/envoy 1.17.4, envoyrproxy/envoy 1.16.5 Doc Type: If docs needed, set a value
Doc Text:
An authorization bypass vulnerability was found in envoyproxy/envoy. When a URI path-based authorization policy is specified, envoy incorrectly evaluates the HTTP request which contains a URI #fragment. This flaw allows an attacker to bypass the authorization policy and access downstream services. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-08-25 15:35:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1996910    

Description Mark Cooper 2021-08-24 03:36:21 UTC
Envoy proxy through 1.19.1 contains a vulnerability where a HTTP request with a fragment in the URI can bypass authorization policies.

Comment 2 errata-xmlrpc 2021-08-25 09:34:44 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 1.1

Via RHSA-2021:3273 https://access.redhat.com/errata/RHSA-2021:3273

Comment 3 errata-xmlrpc 2021-08-25 09:35:31 UTC
This issue has been addressed in the following products:

  OpenShift Service Mesh 2.0

Via RHSA-2021:3272 https://access.redhat.com/errata/RHSA-2021:3272

Comment 4 Product Security DevOps Team 2021-08-25 15:35:06 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-32779