Unrated severityNVD Advisory· Published Jul 25, 2023· Updated Oct 24, 2024
Envoy vulnerable to OAuth2 credentials exploit with permanent validity
CVE-2023-35941
Description
Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, a malicious client is able to construct credentials with permanent validity in some specific scenarios. This is caused by the some rare scenarios in which HMAC payload can be always valid in OAuth2 filter's check. Versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12 have a fix for this issue. As a workaround, avoid wildcards/prefix domain wildcards in the host's domain configuration.
Affected products
1- Range: >= 1.26.0, < 1.26.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/envoyproxy/envoy/security/advisories/GHSA-7mhv-gr67-hq55mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.