CVE-2023-35943Use After Free in Envoy

CWE-416Use After Free2 documents2 sources
Severity
7.5HIGHNVD
EPSS
0.0%
top 98.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 25

Description

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, the CORS filter will segfault and crash Envoy when the `origin` header is removed and deleted between `decodeHeaders`and `encodeHeaders`. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, do not remove the `origin` header in the Envoy configuration.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5envoyproxy/envoy< 1.23.12+3
NVDenvoyproxy/envoy1.23.01.23.12+3

📋Vendor Advisories

1
Red Hat
envoy: CORS filter segfault when origin header is removed2023-07-25
CVE-2023-35943 — Use After Free in Envoyproxy Envoy | cvebase