Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Bug 2259228
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh98 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Bug 2259228
(
CVE-2024-23326
) -
CVE-2024-23326
envoy: Envoy incorrectly accepts HTTP 200 response for entering upgrade mode
Summary:
CVE-2024-23326 envoy: Envoy incorrectly accepts HTTP 200 response for enterin...
Keywords
:
Security
Status
:
NEW
Alias:
CVE-2024-23326
Product:
Security Response
Classification:
Other
Component:
vulnerability
Sub Component:
---
Version:
unspecified
Hardware:
All
OS:
Linux
Priority:
medium
Severity:
medium
Target Milestone:
---
Assignee:
Product Security
QA Contact:
Docs Contact:
URL:
Whiteboard:
Depends On:
Blocks:
2276371
TreeView+
depends on
/
blocked
Reported:
2024-01-19 16:25 UTC by
Patrick Del Bello
Modified:
2024-06-14 11:58 UTC (
History
)
CC List:
5 users
(
show
)
jwendell
rcernich
security-response-team
trathi
twalsh
Fixed In Version:
envoy 1.30.2, envoy 1.29.5, envoy 1.28.4, envoy 1.27.6
Doc Type:
If docs needed, set a value
Doc Text:
A possible request smuggling vulnerability exists through Envoy. This issue occurs if a server can be tricked into adding an upgrade header into a response.
Clone Of:
Environment:
Last Closed:
Embargoed:
Attachments
(Terms of Use)
Description
Patrick Del Bello
2024-01-19 16:25:05 UTC
Envoy incorrectly accepts HTTP 200 response for entering upgrade mode
Note
You need to
log in
before you can comment on or make changes to this bug.