Vulnerability Description
Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envoyproxy | Envoy | < 1.22.9 |
Related Weaknesses (CWE)
References
- https://datatracker.ietf.org/doc/html/rfc9113#section-8.3Not Applicable
- https://datatracker.ietf.org/doc/html/rfc9114#section-4.3.1Not Applicable
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rpExploitVendor Advisory
- https://www.rfc-editor.org/rfc/rfc9110#section-5.6.2Not Applicable
- https://datatracker.ietf.org/doc/html/rfc9113#section-8.3Not Applicable
- https://datatracker.ietf.org/doc/html/rfc9114#section-4.3.1Not Applicable
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-5jmv-cw9p-f9rpExploitVendor Advisory
- https://www.rfc-editor.org/rfc/rfc9110#section-5.6.2Not Applicable
FAQ
What is CVE-2023-27491?
CVE-2023-27491 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6,...
How severe is CVE-2023-27491?
CVE-2023-27491 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-27491?
Check the references section above for vendor advisories and patch information. Affected products include: Envoyproxy Envoy.