Learn about CVE-2023-27488 impacting Envoy proxy versions prior to 1.26.0, leading to invalid protobuf generation from non-UTF-8 HTTP headers.
This CVE record pertains to a vulnerability in the Envoy gRPC client, leading to the production of invalid protobuf when receiving an HTTP header with a non-UTF8 value.
Understanding CVE-2023-27488
This vulnerability affects versions of Envoy proxy prior to 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9. It allows for privilege escalation when the
failure_mode_allow: true
configuration is set for the ext_authz
filter, potentially impacting logging and visibility components.
What is CVE-2023-27488?
The vulnerability in Envoy gRPC client results in the generation of invalid protobuf messages when an HTTP header containing non-UTF-8 data is received. This could lead to errors during message decoding by the receiving service, affecting the proper functioning of ext_authz, ext_proc, tap, ratelimit filters, and grpc access log service.
The Impact of CVE-2023-27488
The impact of this vulnerability includes the potential for privilege escalation and the failure to log requests by the receiving service when certain configurations are in place, impacting the overall visibility and integrity of the system.
Technical Details of CVE-2023-27488
This section delves into the specifics of the vulnerability, including the description, affected systems and versions, and the exploitation mechanism.
Vulnerability Description
The vulnerability allows for the creation of invalid protobuf messages in Envoy when non-UTF-8 data is present in HTTP headers, potentially leading to errors in message decoding by the receiving service.
Affected Systems and Versions
Envoy versions prior to 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 are affected by this vulnerability, specifically impacting configurations involving
failure_mode_allow: true
for the ext_authz
filter.
Exploitation Mechanism
The exploitation of this vulnerability occurs when Envoy processes HTTP headers with non-UTF-8 values, triggering the generation of invalid protobuf messages and potential errors during message decoding by the receiving service.
Mitigation and Prevention
To address CVE-2023-27488, immediate steps can be taken to mitigate the risk and prevent exploitation of the vulnerability.
Immediate Steps to Take
failure_mode_allow
for the ext_authz
filter to minimize privilege escalation risks.failure_mode_allow: false
for ext_authz
to enhance security.Long-Term Security Practices
Patching and Updates
Envoy has released patches in versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 to address this vulnerability. It is crucial to apply these updates promptly to secure the Envoy deployments against CVE-2023-27488.