Bug 2300352 (CVE-2024-7207) - envoy: Server-side request forgery via HTTP header manipulation
Summary: envoy: Server-side request forgery via HTTP header manipulation
Keywords:
Status: NEW
Alias: CVE-2024-7207
Product: Security Response
Classification: Other
Component: vulnerability-draft
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-07-29 13:16 UTC by Mauro Matteo Cascella
Modified: 2024-10-29 16:49 UTC (History)
9 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2024-07-29 13:16:26 UTC
A flaw was found in Envoy. It is possible to modify/manipulate headers from external clients when pass-through routes are used for the ingress gateway. A malicious user could use this flaw to forge what is logged by Envoy as a requested path, as well as cause the Envoy proxy to make requests to internal-only services or potentially arbitrary external systems.


Note You need to log in before you can comment on or make changes to this bug.