CVE-2021-32777Incorrect Behavior Order: Authorization Before Parsing and Canonicalization in Envoy

Severity
8.6HIGHNVD
NVD8.3GHSA8.3OSV8.3
EPSS
0.0%
top 94.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 24
Latest updateSep 10

Description

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, only the last header value is sent. This may allow specifically crafted requests to bypass authorization. Attackers may be able to escalate privileges when using ext-authz extension or back end service

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:LExploitability: 3.9 | Impact: 3.7

Affected Packages4 packages

NVDenvoyproxy/envoy1.17.01.17.4+4
NVDpomerium/pomerium0.11.00.14.8+1
Gogithub.com/pomerium_pomerium0.11.00.14.8+1
CVEListV5pomerium/pomerium>= 0.11.0, < 0.14.8, >= 0.15.0, < 0.15.1+1

🔴Vulnerability Details

2
OSV
Incorrect Authorization with specially crafted requests2021-09-10
GHSA
Incorrect Authorization with specially crafted requests2021-09-10

📋Vendor Advisories

1
Red Hat
envoyproxy/envoy: HTTP request with multiple value headers can bypass authorization policies2021-08-24
CVE-2021-32777 — Envoyproxy Envoy vulnerability | cvebase