CVE-2024-45808

EUVD-2024-41613
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 17%
Affected Products (NVD)
VendorProductVersion
envoyproxyenvoy
𝑥
< 1.28.7
envoyproxyenvoy
1.29.0 ≤
𝑥
< 1.29.9
envoyproxyenvoy
1.30.0 ≤
𝑥
< 1.30.6
envoyproxyenvoy
1.31.0 ≤
𝑥
< 1.31.2
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
envoyproxyenvoy
𝑥
< 1.28.7
ADP
envoyproxyenvoy
1.29.0 ≤
𝑥
< 1.29.9
ADP
envoyproxyenvoy
1.30.0 ≤
𝑥
< 1.30.6
ADP
envoyproxyenvoy
1.31.0 ≤
𝑥
< 1.31.2
ADP