CVE-2023-35944

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-35944
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-35944.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-35944
Aliases
Related
  • GHSA-pvgm-7jpg-pw5g
Published
2023-07-25T19:15:11Z
Modified
2025-02-19T03:33:08.445690Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

Envoy is an open source edge and service proxy designed for cloud-native applications. Envoy allows mixed-case schemes in HTTP/2, however, some internal scheme checks are case-sensitive. Prior to versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, this can lead to the rejection of requests with mixed-case schemes such as htTp or htTps, or the bypassing of some requests such as https in unencrypted connections. With a fix in versions 1.27.0, 1.26.4, 1.25.9, 1.24.10, and 1.23.12, Envoy will now lowercase scheme values by default, and change the internal scheme checks that were case-sensitive to be case-insensitive. There are no known workarounds for this issue.

References

Affected packages

Git / github.com/envoyproxy/envoy

Affected ranges

Type
GIT
Repo
https://github.com/envoyproxy/envoy
Events

Affected versions

v1.*

v1.23.0
v1.23.1
v1.23.10
v1.23.11
v1.23.2
v1.23.3
v1.23.4
v1.23.5
v1.23.6
v1.23.7
v1.23.8
v1.23.9