Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-45808


Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.


Published

2024-09-20T00:15:02.733

Last Modified

2024-09-25T17:18:38.823

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-117
  • Type: Primary
    CWE-116

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application envoyproxy envoy < 1.28.7 Yes
Application envoyproxy envoy < 1.29.9 Yes
Application envoyproxy envoy < 1.30.6 Yes
Application envoyproxy envoy < 1.31.2 Yes

References