mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
19 lines
1014 B
Markdown
19 lines
1014 B
Markdown
![]() |
### [CVE-2022-29228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29228)
|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-rww6-8h7g-8jf6
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/ARPSyndicate/cvemon
|
|||
|
- https://github.com/ssst0n3/docker_archive
|
|||
|
|