8.3
CVSSv3

CVE-2021-32777

Published: 24/08/2021 Updated: 15/06/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 8.3 | Impact Score: 3.7 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

An authorization bypass vulnerability was found in envoyproxy/envoy. Envoy incorrectly evaluates an HTTP request with multiple `value` headers. This flaw allows an malicious user to bypass rule policies that use the `ext_authz` extension. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

envoyproxy envoy 1.19.0

envoyproxy envoy

Vendor Advisories

An authorization bypass vulnerability was found in envoyproxy/envoy Envoy incorrectly evaluates an HTTP request with multiple `value` headers This flaw allows an attacker to bypass rule policies that use the `ext_authz` extension The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability ...
Envoy, as used by Istio before version 1111, contains a remotely exploitable vulnerability that an HTTP request with multiple value headers could do an incomplete authorization policy check when the ext_authz extension is used When a request header contains multiple values, the external authorization server will only see the last value of the gi ...