icon

We found results for “

CVE-2024-45808

Good to know:

icon

Date: September 19, 2024

Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the "REQUESTED_SERVER_NAME" field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Language: C++

Severity Score

Severity Score

Weakness Type (CWE)

Improper Encoding or Escaping of Output

CWE-116

Improper Output Neutralization for Logs

CWE-117

Top Fix

icon

Upgrade Version

Upgrade to version envoy-mobile-sys - no_fix

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us