Vulnerability Name: | CVE-2019-9900 (CCN-160238) | ||||||||||||
Assigned: | 2019-03-30 | ||||||||||||
Published: | 2019-03-30 | ||||||||||||
Updated: | 2022-01-01 | ||||||||||||
Summary: | When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources. | ||||||||||||
CVSS v3 Severity: | 8.3 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L) 7.3 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L/E:U/RL:U/RC:R)
4.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-74 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-9900 Source: REDHAT Type: Third Party Advisory RHSA-2019:0741 Source: XF Type: UNKNOWN envoy-cve20199900-sec-bypass(160238) Source: CCN Type: envoy GIT Repository CVE-2019-9900 #6434 Source: CONFIRM Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/envoyproxy/envoy/issues/6434 Source: CONFIRM Type: Exploit, Mitigation, Third Party Advisory https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h Source: CONFIRM Type: Third Party Advisory https://groups.google.com/forum/#!topic/envoy-announce/VoHfnDqZiAM Source: CONFIRM Type: Release Notes, Vendor Advisory https://www.envoyproxy.io/docs/envoy/v1.9.1/intro/version_history Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-9900 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |