-
Notifications
You must be signed in to change notification settings - Fork 0
Description
CVE-2020-15104 - Medium Severity Vulnerability
Vulnerable Library - envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156
*ATTENTION!: The content of this repo is merged into https://github.com/envoyproxy/envoy and future development is happening there.
Library home page: https://github.com/envoyproxy/envoy-wasm.git
Found in HEAD commit: 320650059a0b0796f39380aaca16815f2f8a4625
Found in base branch: master
Vulnerability Details
In Envoy before versions 1.12.6, 1.13.4, 1.14.4, and 1.15.0 when validating TLS certificates, Envoy would incorrectly allow a wildcard DNS Subject Alternative Name apply to multiple subdomains. For example, with a SAN of *.example.com, Envoy would incorrectly allow nested.subdomain.example.com, when it should only allow subdomain.example.com. This defect applies to both validating a client TLS certificate in mTLS, and validating a server TLS certificate for upstream connections. This vulnerability is only applicable to situations where an untrusted entity can obtain a signed wildcard TLS certificate for a domain of which you only intend to trust a subdomain of. For example, if you intend to trust api.mysubdomain.example.com, and an untrusted actor can obtain a signed TLS certificate for *.example.com or *.com. Configurations are vulnerable if they use verify_subject_alt_name in any Envoy version, or if they use match_subject_alt_names in version 1.14 or later. This issue has been fixed in Envoy versions 1.12.6, 1.13.4, 1.14.4, 1.15.0.
Publish Date: 2020-07-14
URL: CVE-2020-15104
CVSS 3 Score Details (5.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: GHSA-w5f5-6qhq-hhrg
Release Date: 2020-07-14
Fix Resolution: 1.12.6,1.13.4,1.14.4,1.15.0
Step up your Open Source Security Game with WhiteSource here