VYPR
Moderate severityNVD Advisory· Published May 25, 2023· Updated Jan 16, 2025

Potential HTTP policy bypass when using header rules in Cilium

CVE-2023-30851

Description

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple toEndpoints AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/cilium/ciliumGo
< 1.11.161.11.16
github.com/cilium/ciliumGo
>= 1.12.0, < 1.12.91.12.9
github.com/cilium/ciliumGo
>= 1.13.0, < 1.13.21.13.2

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.