CVE-2021-39206
Summary
| CVE | CVE-2021-39206 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-09-09 23:15:00 UTC |
| Updated | 2021-09-27 18:30:00 UTC |
| Description | Pomerium is an open source identity-aware access proxy. Envoy, which Pomerium is based on, contains two authorization related vulnerabilities CVE-2021-32777 and CVE-2021-32779. This may lead to incorrect routing or authorization policy decisions. With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium. Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched. This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Security releases of Envoy 1.19.1, 1.18.4, 1.17.4, and 1.16.5 are now available |
MISC |
groups.google.com |
|
| Incorrectly handling of URI '#fragment' element as part of the path element · Advisory · envoyproxy/envoy · GitHub |
MISC |
github.com |
|
| Incorrect Authorization with specially crafted requests · Advisory · pomerium/pomerium · GitHub |
CONFIRM |
github.com |
|
| Incorrect concatenation of multiple value request headers in ext-authz extension · Advisory · envoyproxy/envoy · GitHub |
MISC |
github.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 981066 Go (go) Security Update for github.com/pomerium/pomerium (GHSA-cfc2-wjcm-c8fm)