4 results (0.009 seconds)

CVSS: 8.7EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability through an url parameter of an authenticated enpoint in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection.This issue affects Envoy: from 4.x to 8.x and < 8.2.4225. • https://csirt.divd.nl/CVE-2024-21879 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-4 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.2EPSS: 0%CPEs: 1EXPL: 0

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability through a url parameter in Enphase IQ Gateway (formerly known as Envoy) allows File Manipulation. The endpoint requires authentication.This issue affects Envoy: from 4.x to 8.0 and < 8.2.4225. • https://csirt.divd.nl/CVE-2024-21877 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.2EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Enphase IQ Gateway (formerly known as Envoy) allows OS Command Injection. This vulnerability is present in an internal script.This issue affects Envoy: from 4.x up to and including 8.x and is currently unpatched. • https://csirt.divd.nl/CVE-2024-21878 https://csirt.divd.nl/DIVD-2024-00011 https://enphase.com/cybersecurity/advisories/ensa-2024-3 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Envoy is a cloud-native, open source edge and service proxy. When an upstream TLS cluster is used with `auto_sni` enabled, a request containing a `host`/`:authority` header longer than 255 characters triggers an abnormal termination of Envoy process. Envoy does not gracefully handle an error when setting SNI for outbound TLS connection. The error can occur when Envoy attempts to use the `host`/`:authority` header value longer than 255 characters as SNI for outbound TLS connection. SNI length is limited to 255 characters per the standard. • https://github.com/envoyproxy/envoy/commit/b47fc6648d7c2dfe0093a601d44cb704b7bad382 https://github.com/envoyproxy/envoy/security/advisories/GHSA-3mh5-6q8v-25wj https://access.redhat.com/security/cve/CVE-2024-32475 https://bugzilla.redhat.com/show_bug.cgi?id=2276149 • CWE-253: Incorrect Check of Function Return Value CWE-617: Reachable Assertion •