Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
25 Sep 2024, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Envoyproxy
Envoyproxy envoy |
|
| CPE | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
| CWE | CWE-116 | |
| References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc - Vendor Advisory |
20 Sep 2024, 12:30
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
20 Sep 2024, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-09-20 00:15
Updated : 2024-09-25 17:18
NVD link : CVE-2024-45808
Mitre link : CVE-2024-45808
CVE.ORG link : CVE-2024-45808
JSON object : View
Products Affected
envoyproxy
- envoy
