CVE-2025-24030

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24030
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24030.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24030
Aliases
Related
Published
2025-01-23T04:15:07Z
Modified
2025-01-28T15:42:01.433344Z
Summary
[none]
Details

Envoy Gateway is an open source project for managing Envoy Proxy as a standalone or Kubernetes-based application gateway. A user with access to the Kubernetes cluster can use a path traversal attack to execute Envoy Admin interface commands on proxies managed by any version of Envoy Gateway prior to 1.2.6. The admin interface can be used to terminate the Envoy process and extract the Envoy configuration (possibly containing confidential data). Version 1.2.6 fixes the issue. As a workaround, the EnvoyProxy API can be used to apply a bootstrap config patch that restricts access strictly to the prometheus stats endpoint. Find below an example of such a bootstrap patch.

References

Affected packages

Git / github.com/envoyproxy/gateway

Affected ranges

Type
GIT
Repo
https://github.com/envoyproxy/gateway
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.0-rc1
v0.2.0-rc2
v0.5.0-rc.1