CVE-2019-9900
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
25/04/2019
Last modified:
07/11/2023
Description
When parsing HTTP/1.x header values, Envoy 1.9.0 and before does not reject embedded zero characters (NUL, ASCII 0x0). This allows remote attackers crafting header values containing embedded NUL characters to potentially bypass header matching rules, gaining access to unauthorized resources.
Impact
Base Score 3.x
8.30
Severity 3.x
HIGH
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | 1.9.0 (including) | |
| cpe:2.3:a:redhat:openshift_service_mesh:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2019:0741
- https://github.com/envoyproxy/envoy/issues/6434
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-x74r-f4mw-c32h
- https://groups.google.com/forum/#%21topic/envoy-announce/VoHfnDqZiAM
- https://www.envoyproxy.io/docs/envoy/v1.9.1/intro/version_history



