CVE-2019-18838
envoy: malformed HTTP request without the Host header may cause abnormal termination of the Envoy process
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
An issue was discovered in Envoy 1.12.0. Upon receipt of a malformed HTTP request without a Host header, it sends an internally generated "Invalid request" response. This internally generated response is dispatched through the configured encoder filter chain before being sent to the client. An encoder filter that invokes route manager APIs that access a request's Host header causes a NULL pointer dereference, resulting in abnormal termination of the Envoy process.
Se detectó un problema en Envoy versión 1.12.0. Tras recibir una petición HTTP malformada sin un encabezado Host, se envía una respuesta "Invalid request" generada internamente. Esta respuesta generada internamente es enviada por medio de la cadena de filtro del codificador configurado antes de enviarse al cliente. Un filtro del codificador que invoca las API de administrador de ruta que acceden al encabezado Host de una petición causa una desreferencia del puntero NULL, resultando en la terminación anormal del proceso de Envoy.
A flaw was found in envoy. A malformed HTTP request without the Host header may cause abnormal termination of the Envoy process. The highest threat from this vulnerability is to system availability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-11-08 CVE Reserved
- 2019-12-12 CVE Published
- 2023-11-08 EPSS Updated
- 2024-08-05 CVE Updated
- 2024-08-05 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-358: Improperly Implemented Security Check for Standard
- CWE-476: NULL Pointer Dereference
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://blog.envoyproxy.io | Product | |
https://groups.google.com/forum/#%21forum/envoy-users | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://github.com/envoyproxy/envoy/security/advisories/GHSA-f2rv-4w6x-rwhc | 2024-08-05 |
URL | Date | SRC |
---|---|---|
https://github.com/envoyproxy/envoy/commits/master | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2019-18838 | 2019-12-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1773449 | 2019-12-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Envoyproxy Search vendor "Envoyproxy" | Envoy Search vendor "Envoyproxy" for product "Envoy" | <= 1.12.1 Search vendor "Envoyproxy" for product "Envoy" and version " <= 1.12.1" | - |
Affected
|