CVE-2023-30851
Summary
| CVE | CVE-2023-30851 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-05-25 18:15:00 UTC |
| Updated | 2023-06-01 20:35:00 UTC |
| Description | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Release 1.13.2 · cilium/cilium · GitHub | MISC | github.com | |
| Release 1.12.9 · cilium/cilium · GitHub | MISC | github.com | |
| Release 1.11.16 · cilium/cilium · GitHub | MISC | github.com | |
| Potential HTTP policy bypass when using header rules · Advisory · cilium/cilium · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.