CVE-2023-27491
Summary
| CVE | CVE-2023-27491 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-04-04 19:15:00 UTC |
| Updated | 2023-04-11 14:43:00 UTC |
| Description | Envoy is an open source edge and service proxy designed for cloud-native applications. Compliant HTTP/1 service should reject malformed request lines. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, There is a possibility that non compliant HTTP/1 service may allow malformed requests, potentially leading to a bypass of security policies. This issue is fixed in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9. |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|
| Application |
Envoyproxy |
Envoy |
All |
All |
All |
All |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 160710 Oracle Enterprise Linux Security Update for olcne (ELSA-2023-23648)
- 355149 Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2023-2023-165
- 355316 Amazon Linux Security Advisory for ecs-service-connect-agent : ALAS2ECS-2023-003