CVE-2022-29226
Trivial authentication bypass in Envoy
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue.
Envoy es un proxy de alto rendimiento nativo de la nube. En versiones anteriores a 1.22.1, la implementación del filtro OAuth no incluye un mecanismo para comprobar los tokens de acceso, por lo que, por diseño, cuando falta la cookie firmada por HMAC, debería desencadenarse un flujo de autenticación completo. Sin embargo, la implementación actual asume que los tokens de acceso son siempre comprobados, permitiendo así el acceso en presencia de cualquier token de acceso adjunto a la petición. Es recomendado a usuarios actualizar. No es conocida ninguna mitigación para este problema
A flaw was found in Envoy. The OAuth filter does not include an implementation for validating access tokens, allowing remote attackers to bypass authentication to Envoy by providing any token value.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2022-04-13 CVE Reserved
- 2022-06-09 CVE Published
- 2023-12-31 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-303: Incorrect Implementation of Authentication Algorithm
- CWE-306: Missing Authentication for Critical Function
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/envoyproxy/envoy/security/advisories/GHSA-h45c-2f94-prxh | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360 | 2022-06-16 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2022-29226 | 2022-06-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2088739 | 2022-06-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Envoyproxy Search vendor "Envoyproxy" | Envoy Search vendor "Envoyproxy" for product "Envoy" | < 1.22.1 Search vendor "Envoyproxy" for product "Envoy" and version " < 1.22.1" | - |
Affected
|