Race Condition Affecting envoyproxy/envoy package, versions [,1.9.1)


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.36% (73rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ENVOYPROXYENVOY-2365512
  • published26 Jan 2022
  • disclosed25 Apr 2019
  • creditUnknown

Introduced: 25 Apr 2019

CVE-2019-9901  (opens in a new tab)
CWE-706  (opens in a new tab)

How to fix?

Upgrade envoyproxy/envoy to version 1.9.1 or higher.

Overview

Affected versions of this package are vulnerable to Race Condition. Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access control policy.

CVSS Scores

version 3.1