ISTIO-SECURITY-2024-006
CVEs reported by Envoy.
| Disclosure Details | |
|---|---|
| CVE(s) | CVE-2024-45807 CVE-2024-45808 CVE-2024-45806 CVE-2024-45809 CVE-2024-45810 | 
| CVSS Impact Score | 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H | 
| Affected Releases | 1.22.0 to 1.22.4 1.23.0 to 1.23.1 | 
CVE
Envoy CVEs
- CVE-2024-45807: (CVSS Score 7.5, High): oghttp2 may crash on - OnBeginHeadersForStream.
- CVE-2024-45808: (CVSS Score 6.5, Moderate): Lack of validation for - REQUESTED_SERVER_NAMEfield for access loggers enables injection of unexpected content into access logs.
- CVE-2024-45806: (CVSS Score 6.5, Moderate): Potential for - x-envoyheaders to be manipulated by external sources.
- CVE-2024-45809: (CVSS Score 5.3, Moderate): JWT filter crash in the clear route cache with remote JWKs. 
- CVE-2024-45810: (CVSS Score 6.5, Moderate): Envoy crashes for - LocalReplyin HTTP async client.
Am I Impacted?
You are impacted if you are using Istio 1.22.0 to 1.22.4 or 1.23.0 to 1.23.1.
If you deploy an Istio Ingress Gateway, you are potentially vulnerable to x-envoy header manipulation by external sources. Envoy previously considered all private IP to be internal
by default and as a result, did not sanitize headers from external sources with private IPs. Envoy added support for the flag envoy.reloadable_features.explicit_internal_address_config
to explicitly un-trust all IPs. Envoy and Istio currently disable the flag by default for backwards compatibility. In future Envoy and Istio release the flag
envoy.reloadable_features.explicit_internal_address_config will be enabled by default. The Envoy flag can be set mesh-wide or per-proxy via the ProxyConfig
in runtimeValues.
Mesh-wide example configuration:
meshConfig:
  defaultConfig:
    runtimeValues:
      "envoy.reloadable_features.explicit_internal_address_config": "true"Per-proxy example configuration:
annotations:
  proxy.istio.io/config: |
    runtimeValues:
      "envoy.reloadable_features.explicit_internal_address_config": "true"Note fields in ProxyConfig are not dynamically configured; changes will require restart of workloads to take effect.