Lucene search

K
cvelistGitHub_MCVELIST:CVE-2022-21655
HistoryFeb 22, 2022 - 10:40 p.m.

CVE-2022-21655 Incorrect handling of internal redirects results in crash in Envoy

2022-02-2222:40:11
CWE-670
GitHub_M
www.cve.org
5
envoy
internal redirects
denial of service

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

39.2%

Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.

CNA Affected

[
  {
    "product": "envoy",
    "vendor": "envoyproxy",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.18.6"
      },
      {
        "status": "affected",
        "version": ">= 1.19.0, < 1.19.3"
      },
      {
        "status": "affected",
        "version": ">= 1.20.0, < 1.20.2"
      },
      {
        "status": "affected",
        "version": ">= 1.21.0, < 1.21.1"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

39.2%