漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Contour: Lua code injection via Cookie Path Rewrite Policy
Vulnerability Description
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPProxy resources can craft a malicious value in spec.routes[].cookieRewritePolicies[].pathRewrite.value or spec.routes[].services[].cookieRewritePolicies[].pathRewrite.value that results in arbitrary code execution in the Envoy proxy. The cookie rewriting feature is internally implemented using Envoy's HTTP Lua filter. User-controlled values are interpolated into Lua source code using Go text/template without sufficient sanitization. The injected code only executes when processing traffic on the attacker's own route, which they already control. However, since Envoy runs as shared infrastructure, the injected code can also read Envoy's xDS client credentials from the filesystem or cause denial of service for other tenants sharing the Envoy instance. This vulnerability is fixed in v1.33.4, v1.32.5, and v1.31.6.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Vulnerability Title
Contour 代码注入漏洞
Vulnerability Description
Contour是Project Contour开源的一款使用Envoy代理的Kubernetes入口控制器。 Contour v1.19.0至v1.33.4之前版本、v1.32.5之前版本和v1.31.6之前版本存在代码注入漏洞,该漏洞源于Cookie重写功能易受Lua代码注入攻击,导致任意代码执行。
CVSS Information
N/A
Vulnerability Type
N/A