7.5
CVSSv2

CVE-2019-9900

Published: 25/04/2019 Updated: 01/05/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 8.3 | Impact Score: 3.7 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.

Vulnerability Trend

Affected Products

Vendor Product Versions
EnvoyproxyEnvoy1.9.0

Vendor Advisories

Synopsis Important: Istio-Proxy Security Update Type/Severity Security Advisory: Important Topic An update for Istio-Proxy is now available for Red Hat OpenShift Service Mesh Tech Preview 090Red Hat Product Security has rated this update as having a security impact ofimportant A Common Vulnerability Sco ...

Github Repositories

How to use this tool? If envoy is in your path, Simply run it! $ envoy-cves ✔ Success! your envoy was tested and is immune to CVE-2019-9901 Make sure that the option normalize_path is turned on in your HCM settings ✔ Success! your envoy was tested and is immune to CVE-2019-9900 If not, provide the path to envoy in a flag: envoy-cves --envoy=/path/to/envoy ✘ Fail! your