Vulnerability Name: | CVE-2021-39206 (CCN-209010) | ||||||||||||
Assigned: | 2021-09-09 | ||||||||||||
Published: | 2021-09-09 | ||||||||||||
Updated: | 2021-09-27 | ||||||||||||
Summary: | Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation. | ||||||||||||
CVSS v3 Severity: | 8.6 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N) 7.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-863 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-39206 Source: XF Type: UNKNOWN pomerium-cve202139206-sec-bypass(209010) Source: MISC Type: Third Party Advisory https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h Source: MISC Type: Third Party Advisory https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9 Source: CCN Type: Pomerium GIT Repository Incorrect Authorization with specially crafted requests Source: CONFIRM Type: Third Party Advisory https://github.com/pomerium/pomerium/security/advisories/GHSA-cfc2-wjcm-c8fm Source: MISC Type: Not Applicable https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |