CVE-2023-27496 Affecting ecs-service-connect-agent package, versions <0:v1.25.4.0-1.amzn2023


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2023-ECSSERVICECONNECTAGENT-5496039
  • published4 May 2023
  • disclosed4 Apr 2023

Introduced: 4 Apr 2023

CVE-2023-27496  (opens in a new tab)

How to fix?

Upgrade Amazon-Linux:2023 ecs-service-connect-agent to version 0:v1.25.4.0-1.amzn2023 or higher.
This issue was patched in ALAS2023-2023-165.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ecs-service-connect-agent package and not the ecs-service-connect-agent package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2023 relevant fixed versions and status.

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a state query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the state parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).

CVSS Scores

version 3.1