We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-21679

Authorization Policy bypass in Istio



AssignerGitHub_M
Reserved2021-11-16
Published2022-01-19
Updated2024-08-03

Description

Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.



MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Product status

>= 1.12.0, < 1.12.2
affected

References

https://github.com/istio/istio/security/advisories/GHSA-rwfr-xrvw-2rvv

https://istio.io/latest/news/releases/1.12.x/announcing-1.12.2/

cve.org CVE-2022-21679

nvd.nist.gov CVE-2022-21679

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-21679
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.