Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Istio through 1.5.1 and Envoy through 1.14.1 have a data-leak issue. If there is a TCP connection (negotiated with SNI over HTTPS) to *.example.com, a request for a domain concurrently configured explicitly (e.g., abc.example.com) is sent to the server(s) listening behind *.example.com. The outcome should instead be 421 Misdirected Request. Imagine a shared caching forward proxy re-using an HTTP/2 connection for a large subnet with many users. If a victim is interacting with abc.example.com, and a server (for abc.example.com) recycles the TCP connection to the forward proxy, the victim's browser may suddenly start sending sensitive data to a *.example.com server. This occurs because the forward proxy between the victim and the origin server reuses connections (which obeys the specification), but neither Istio nor Envoy corrects this by sending a 421 error. Similarly, this behavior voids the security model browsers have put in place between domains.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Envoy和Istio 信息泄露漏洞
Vulnerability Description
Envoy是一款开源的分布式代理服务器。Istio是一套连接、管理和保护微服务的开放平台。 Istio 1.5.1及之前版本和Envoy 1.14.1及之前版本中存在信息泄露漏洞。攻击者可利用该漏洞获取敏感数据。
CVSS Information
N/A
Vulnerability Type
N/A