cve-2022-21679
Vulnerability from cvelistv5
Published
2022-01-19 21:35
Modified
2024-08-03 02:46
Severity ?
EPSS score ?
Summary
Authorization Policy bypass in Istio
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv | Third Party Advisory | |
security-advisories@github.com | https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/ | Release Notes, Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T02:46:39.336Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "istio", "vendor": "istio", "versions": [ { "status": "affected", "version": "\u003e= 1.12.0, \u003c 1.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-670", "description": "CWE-670: Always-Incorrect Control Flow Implementation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-19T21:35:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv" }, { "tags": [ "x_refsource_MISC" ], "url": "https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/" } ], "source": { "advisory": "GHSA-rwfr-xrvw-2rvv", "discovery": "UNKNOWN" }, "title": "Authorization Policy bypass in Istio", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-21679", "STATE": "PUBLIC", "TITLE": "Authorization Policy bypass in Istio" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "istio", "version": { "version_data": [ { "version_value": "\u003e= 1.12.0, \u003c 1.12.2" } ] } } ] }, "vendor_name": "istio" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-670: Always-Incorrect Control Flow Implementation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv", "refsource": "CONFIRM", "url": "https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv" }, { "name": "https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/", "refsource": "MISC", "url": "https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/" } ] }, "source": { "advisory": "GHSA-rwfr-xrvw-2rvv", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-21679", "datePublished": "2022-01-19T21:35:10", "dateReserved": "2021-11-16T00:00:00", "dateUpdated": "2024-08-03T02:46:39.336Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-21679\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-01-19T22:15:09.397\",\"lastModified\":\"2022-01-27T13:58:54.303\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.\"},{\"lang\":\"es\",\"value\":\"Istio es una plataforma abierta para conectar, administrar y asegurar microservicios. En Istio versiones 1.12.0 y 1.12.1 la pol\u00edtica de autorizaci\u00f3n con hosts y notHosts podr\u00eda ser accidentalmente omitida para la acci\u00f3n ALLOW o rechazada inesperadamente para la acci\u00f3n DENY durante la actualizaci\u00f3n de 1.11 a 1.12.0/1.12.1. Istio 1.12 soporta los campos hosts y notHosts en la pol\u00edtica de autorizaci\u00f3n con una nueva API Envoy enviada con el plano de datos 1.12. Un error en las versiones 1.12.0 y 1.12.1 usa incorrectamente la nueva API de Envoy con el plano de datos 1.11. Esto causar\u00e1 que los campos hosts y notHosts siempre coincidan independientemente del valor real del encabezado del host cuando sean mezclados el plano de control 1.12.0/1.12.1 y el plano de datos 1.11. Se aconseja a usuarios actualizar o no mezclar el plano de control 1.12.0/1.12.1 con el plano de datos 1.11 si son usados los campos hosts o notHosts en la pol\u00edtica de autorizaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.6,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-670\"}]},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-670\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B2B35-67C9-45E7-BD22-D5D0D2ABCF99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:alpha0:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD00F2A2-486F-46E2-9BF4-6DE373ED8888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD0099BA-C66D-46F5-8FAA-A0907958C3EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CDAFD18-6EFA-4422-A96A-14EB4AB2C39D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:beta0:*:*:*:*:*:*\",\"matchCriteriaId\":\"67888CB0-9E8D-4B00-8EE1-15FCA8CACC99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"13297C9A-DAC0-4A30-9A12-FA1D97B5B3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"211C5259-7CE6-43FD-BFC6-C6F9F814D43F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D226294-4A77-46E3-AF12-01DE9ECBC568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:istio:istio:1.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13BA0A8-3131-4F15-AB6B-0B4C71885603\"}]}]}],\"references\":[{\"url\":\"https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.