We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-21679

Authorization Policy bypass in Istio



Description

Istio is an open platform to connect, manage, and secure microservices. In Istio 1.12.0 and 1.12.1 The authorization policy with hosts and notHosts might be accidentally bypassed for ALLOW action or rejected unexpectedly for DENY action during the upgrade from 1.11 to 1.12.0/1.12.1. Istio 1.12 supports the hosts and notHosts fields in authorization policy with a new Envoy API shipped with the 1.12 data plane. A bug in the 1.12.0 and 1.12.1 incorrectly uses the new Envoy API with the 1.11 data plane. This will cause the hosts and notHosts fields to be always matched regardless of the actual value of the host header when mixing 1.12.0/1.12.1 control plane and 1.11 data plane. Users are advised to upgrade or to not mix the 1.12.0/1.12.1 control plane with 1.11 data plane if using hosts or notHosts field in authorization policy.

Reserved 2021-11-16 | Published 2022-01-19 | Updated 2024-08-03 | Assigner GitHub_M


MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-670: Always-Incorrect Control Flow Implementation

Product status

>= 1.12.0, < 1.12.2
affected

References

github.com/.../istio/security/advisories/GHSA-rwfr-xrvw-2rvv

istio.io/latest/news/releases/1.12.x/announcing-1.12.2/

cve.org (CVE-2022-21679)

nvd.nist.gov (CVE-2022-21679)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2022-21679

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.