CVE-2019-9901
istio/envoy: Path traversal via URL Patch manipulation in HTTP/1.x header
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Envoy 1.9.0 and before does not normalize HTTP URL paths. A remote attacker may craft a relative path, e.g., something/../admin, to bypass access control, e.g., a block on /admin. A backend server could then interpret the non-normalized path and provide an attacker access beyond the scope provided for by the access control policy.
Envoy versión 1.9.0 y anteriores no normalizan las path URL HTTP. Un atacante remoto puede crear un path relativo, por ejemplo, algo/.. /admin, para omitir el control de acceso, por ejemplo, un bloque en/admin. A continuación, un servidor back-end podría interpretar el path no normalizado y suministrar a un atacante acceso más allá del ámbito suministrado por la Directiva de control de acceso.
A flaw was found in Envoy version 1.9.0 and older, where Envoy does not normalize HTTP URL paths. This flaw allows a remote attacker to craft a path with a relative path and to bypass access control. This issue results in a backend server with the ability to interpret the unnormalized path.
Red Hat OpenShift Service Mesh is Red Hat's distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include bypass and traversal vulnerabilities.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-03-21 CVE Reserved
- 2019-04-11 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-706: Use of Incorrectly-Resolved Name or Reference
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://github.com/envoyproxy/envoy/issues/6435 | Issue Tracking | |
https://github.com/envoyproxy/envoy/security/advisories/GHSA-xcx5-93pw-jw2w | X_refsource_confirm | |
https://groups.google.com/forum/#%21topic/envoy-announce/VoHfnDqZiAM | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.envoyproxy.io/docs/envoy/v1.9.1/intro/version_history | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2019-9901 | 2019-04-10 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1698025 | 2019-04-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Envoyproxy Search vendor "Envoyproxy" | Envoy Search vendor "Envoyproxy" for product "Envoy" | <= 1.9.0 Search vendor "Envoyproxy" for product "Envoy" and version " <= 1.9.0" | - |
Affected
|