Vulnerability Description
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Envoyproxy | Envoy | >= 1.23.0, < 1.23.12 |
Related Weaknesses (CWE)
References
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55Third Party Advisory
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55Third Party Advisory
FAQ
What is CVE-2023-35941?
CVE-2023-35941 is a vulnerability with a CVSS score of 8.6 (HIGH). Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentia...
How severe is CVE-2023-35941?
CVE-2023-35941 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-35941?
Check the references section above for vendor advisories and patch information. Affected products include: Envoyproxy Envoy.