Skip to content

CVE-2020-15104 (Medium) detected in envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156 #10

@mend-bolt-for-github

Description

@mend-bolt-for-github

CVE-2020-15104 - Medium Severity Vulnerability

Vulnerable Library - envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156

*ATTENTION!: The content of this repo is merged into https://github.com/envoyproxy/envoy and future development is happening there.

Library home page: https://github.com/envoyproxy/envoy-wasm.git

Found in HEAD commit: 320650059a0b0796f39380aaca16815f2f8a4625

Found in base branch: master

Vulnerable Source Files (1)

envoy/source/common/runtime/runtime_features.cc

Vulnerability Details

In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would incorrectly allow nested.subdomain.example.com, when it should only allow subdomain.example.com. This defect applies to both validating a client TLS certificate in mTLS, and validating a server TLS certificate for upstream connections. This vulnerability is only applicable to situations where an untrusted entity can obtain a signed wildcard TLS certificate for a domain of which you only intend to trust a subdomain of. For example, if you intend to trust api.mysubdomain.example.com, and an untrusted actor can obtain a signed TLS certificate for *.example.com or *.com. Configurations are vulnerable if they use verify_subject_alt_name in any Envoy version, or if they use match_subject_alt_names in version 1.14 or later. This issue has been fixed in Envoy versions 1.12.6, 1.13.4, 1.14.4, 1.15.0.

Publish Date: 2020-07-14

URL: CVE-2020-15104

CVSS 3 Score Details (5.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: Low
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: GHSA-w5f5-6qhq-hhrg

Release Date: 2020-07-14

Fix Resolution: 1.12.6,1.13.4,1.14.4,1.15.0


Step up your Open Source Security Game with WhiteSource here

Metadata

Metadata

Assignees

No one assigned

    Labels

    security vulnerabilitySecurity vulnerability detected by WhiteSource

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions