by @mweinelt Activity log
- Created automatic suggestion
- @mweinelt accepted
- @mweinelt published on GitHub
Istio HTTP debug endpoints on port 15014 to enforce namespace-based authorization, preventing cross-namespace proxy data access.
Istio is an open platform to connect, manage, and secure microservices. Prior to 1.29.1, 1.28.5, and 1.27.8, a vulnerability in Envoy RBAC header matching could allow authorization policy bypass when policies rely on HTTP headers that may contain multiple values. An attacker could craft requests with multiple header values in a way that causes Envoy to evaluate the header differently than intended, potentially bypassing authorization checks. This may allow unauthorized requests to reach protected services when policies depend on such header-based matching conditions. This vulnerability is fixed in 1.29.1, 1.28.5, and 1.27.8.
References
-
https://github.com/istio/istio/security/advisories/GHSA-974c-2wxh-g4ww x_refsource_CONFIRM
Affected products
- ==< 1.27.8
- ==>= 1.29.0-alpha.0, < 1.29.1
- ==>= 1.28.0-alpha.0, < 1.28.5
Package maintainers
-
@bryanasdev000 Bryan Albuquerque <bryanasdev000@gmail.com>
-
@ryan4yin Ryan Yin <xiaoyin_c@qq.com>
-
@veehaitch Vincent Haupert <mail@vincent-haupert.de>