Information Exposure Affecting istio.io/istio/pilot/pkg/xds package, versions >=1.10.0 <1.10.2 >=1.8.0 <1.9.6


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Confidentiality High

    Threat Intelligence

    EPSS 0.1% (42nd percentile)
Expand this section
NVD
8.8 high
Expand this section
Red Hat
9.1 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-ISTIOIOISTIOPILOTPKGXDS-1315150
  • published 30 Jun 2021
  • disclosed 30 Jun 2021
  • credit Nishant Virmani, Stephane Mercier, Antonin Nycz, John Howard

How to fix?

Upgrade istio.io/istio/pilot/pkg/xds to version 1.10.2, 1.9.6 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. Credentials specified in the Gateway and DestinationRule credentialName field can be accessed from different namespaces.

Users are only impacted if ALL of following conditions are true for their clusters:

  • It is using a vulnerable version of Istio.
  • It has defined Gateways or DestinationRules with the credentialName field specified.
  • It does not specify the Istiod flag PILOT_ENABLE_XDS_CACHE=false.