7.5
CVSSv2

CVE-2019-9901

Published: 25/04/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 10 | Impact Score: 6 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access control policy.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

envoyproxy envoy

Vendor Advisories

Synopsis Important: Istio-Proxy Security Update Type/Severity Security Advisory: Important Topic An update for Istio-Proxy is now available for Red Hat OpenShift Service Mesh Tech Preview 090Red Hat Product Security has rated this update as having a security impact ofimportant A Common Vulnerability Sco ...

Github Repositories

How to use this tool? If envoy is in your path, Simply run it! $ envoy-cves ✔ Success! your envoy was tested and is immune to CVE-2019-9901 Make sure that the option normalize_path is turned on in your HCM settings ✔ Success! your envoy was tested and is immune to CVE-2019-9900 If not, provide the path to envoy in a flag: envoy-cves