| |
Vulnerability CVE-2022-21656
Published: 2022-02-22 Modified: 2022-02-23
Description: |
Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted. |
Type:
CWE-295 (Certificate Issues)
CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
5.8/10 |
4.9/10 |
8.6/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Medium |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
Partial |
None |
References: |
https://github.com/envoyproxy/envoy/commit/bb95af848c939cfe5b5ee33c5b1770558077e64e
https://github.com/envoyproxy/envoy/security/advisories/GHSA-c9g7-xwcv-pjx2
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|