5.0 MEDIUM
- CVSS version (CVSS): 3.1
- Attack Vector (AV): Network (N)
- Attack Complexity (AC): Low (L)
- Privileges Required (PR): Low (L)
- User Interaction (UI): None (N)
- Scope (S): Changed (C)
- Confidentiality (C): Low (L)
- Integrity (I): None (N)
- Availability (A): None (N)
- Modified Attack Vector (MAV): Network (N)
- Modified Attack Complexity (MAC): Low (L)
- Modified Privileges Required (MPR): Low (L)
- Modified User Interaction (MUI): None (N)
- Modified Confidentiality (MC): Low (L)
- Modified Scope (MS): Changed (C)
- Modified Integrity (MI): None (N)
- Modified Availability (MA): None (N)
by @LeSuisse Activity log
- Created suggestion
- @LeSuisse ignored reference https://g…
- @LeSuisse accepted
- @LeSuisse published on GitHub
Istio Vulnerable to SSRF via RequestAuthentication jwksUri
Istio is an open platform to connect, manage, and secure microservices. Prior to versions 1.28.6 and 1.29.2, when a RequestAuthentication resource is created with a jwksUri pointing to an internal service, istiod makes an unauthenticated HTTP GET request to that URL without filtering out localhost or link local ips. This can result in sensitive data being distributed to Envoy proxies via xDS configuration. This issue has been patched in versions 1.28.6 and 1.29.2.
References
-
https://github.com/istio/istio/security/advisories/GHSA-fgw5-hp8f-xfhc x_refsource_CONFIRM
-
https://github.com/istio/istio/releases/tag/1.28.6 x_refsource_MISC
Ignored references (1)
-
https://github.com/istio/istio/releases/tag/1.29.2 x_refsource_MISC
Affected products
- ==< 1.28.6
- ==>= 1.29.0-alpha.0, < 1.29.2
Package maintainers
-
@ryan4yin Ryan Yin <xiaoyin_c@qq.com>
-
@veehaitch Vincent Haupert <mail@vincent-haupert.de>