mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
25 lines
1.7 KiB
Markdown
25 lines
1.7 KiB
Markdown
### [CVE-2024-45808](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45808)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Envoy is a cloud-native high-performance edge/middle/service proxy. A vulnerability has been identified in Envoy that allows malicious attackers to inject unexpected content into access logs. This is achieved by exploiting the lack of validation for the `REQUESTED_SERVER_NAME` field for access loggers. This issue has been addressed in versions 1.31.2, 1.30.6, 1.29.9, and 1.28.7. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc
|
|
|
|
#### Github
|
|
No PoCs found on GitHub currently.
|
|
|