CVE-2023-27496 Affecting istio-istioctl package, versions <0:1.15.7-1.el7


Severity

Recommended
0.0
high
0
10

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
0.09% (39th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE7-ISTIOISTIOCTL-6593691
  • published10 Apr 2024
  • disclosed4 Apr 2023

Introduced: 4 Apr 2023

CVE-2023-27496  (opens in a new tab)

How to fix?

Upgrade Oracle:7 istio-istioctl to version 0:1.15.7-1.el7 or higher.
This issue was patched in ELSA-2023-12357.

NVD Description

Note: Versions mentioned in the description apply only to the upstream istio-istioctl package and not the istio-istioctl package as distributed by Oracle. See How to fix? for Oracle:7 relevant fixed versions and status.

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a state query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the state parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).

CVSS Scores

version 3.1