CVE-2019-9900Injection in Envoy

Severity
8.3HIGHNVD
EPSS
0.0%
top 90.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 24

Description

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.7

Affected Packages1 packages

NVDenvoyproxy/envoy1.9.0

🔴Vulnerability Details

1
GHSA
GHSA-h9r7-c397-3wqr: When parsing HTTP/12022-05-24

📋Vendor Advisories

1
Red Hat
istio/envoy: Authorization bypass via null characters injection in HTTP/1.x2019-04-05

💬Community

2
HackerOne
Vulnerability in http-parser & embedded NULL header handling2020-02-13
Bugzilla
CVE-2019-9900 istio/envoy: Authorization bypass via null characters injection in HTTP/1.x2019-04-09
CVE-2019-9900 — Injection in Envoyproxy Envoy | cvebase