Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-25017


Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.


Published

2020-10-01T17:15:13.337

Last Modified

2024-11-21T05:16:31.453

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.3 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application envoyproxy envoy < 1.12.7 Yes
Application envoyproxy envoy < 1.13.4 Yes
Application envoyproxy envoy < 1.14.4 Yes
Application envoyproxy envoy < 1.15.1 Yes

References