Summary
Envoy references already freed memory when route hash policy is configured with cookie attributes.
Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured.
Affected Components
Envoy request routing table.
Details
Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination.
Impact
Information disclosure or denial of service due to abnormal process termination.
Attack vector(s)
A request from an untrusted peer.
Patches
This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5 or v1.27.7
Workarounds
Do not use cookie attributes in route action hash policy.
Detection
Unexpected characters in the cookie header at the upstream service or abnormal process termination with route hash policy methods in the stack trace.
Credits
[email protected]
Summary
Envoy references already freed memory when route hash policy is configured with cookie attributes.
Note that this vulnerability has been fixed in the open as the effect would be immediately apparent if it was configured.
Affected Components
Envoy request routing table.
Details
Memory allocated for holding attribute values is freed after configuration was parsed. During request processing Envoy will attempt to copy content of de-allocated memory into request cookie header. This can lead to arbitrary content of Envoy's memory to be sent to the upstream service or abnormal process termination.
Impact
Information disclosure or denial of service due to abnormal process termination.
Attack vector(s)
A request from an untrusted peer.
Patches
This vulnerability is fixed in Envoy versions v1.30.4, v1.29.7, v1.28.5 or v1.27.7
Workarounds
Do not use cookie attributes in route action hash policy.
Detection
Unexpected characters in the cookie header at the upstream service or abnormal process termination with route hash policy methods in the stack trace.
Credits
[email protected]