Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
2024-09-20T00:15:02.733
2024-09-25T17:18:38.823
Analyzed
CVSSv3.1: 6.5 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | envoyproxy | envoy | < 1.28.7 | Yes |
Application | envoyproxy | envoy | < 1.29.9 | Yes |
Application | envoyproxy | envoy | < 1.30.6 | Yes |
Application | envoyproxy | envoy | < 1.31.2 | Yes |