cvelist/2024/23xxx/CVE-2024-23323.json

112 lines
4.2 KiB
JSON
Raw Normal View History

2024-01-15 16:00:40 +00:00
{
2024-02-09 23:00:35 +00:00
"data_version": "4.0",
2024-01-15 16:00:40 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-23323",
2024-02-09 23:00:35 +00:00
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
2024-01-15 16:00:40 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-02-09 23:00:35 +00:00
"value": "Envoy is a high-performance edge/middle/service proxy. The regex expression is compiled for every request and can result in high CPU usage and increased request latency when multiple routes are configured with such matchers. This issue has been addressed in released 1.29.1, 1.28.1, 1.27.3, and 1.26.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400: Uncontrolled Resource Consumption",
"cweId": "CWE-400"
}
]
},
{
"description": [
{
"lang": "eng",
"value": "CWE-1176: Inefficient CPU Computation",
"cweId": "CWE-1176"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "envoyproxy",
"product": {
"product_data": [
{
"product_name": "envoy",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": ">= 1.29.0, < 1.29.1"
},
{
"version_affected": "=",
"version_value": ">= 1.28.0, < 1.28.1"
},
{
"version_affected": "=",
"version_value": ">= 1.27.0, < 1.27.3"
},
{
"version_affected": "=",
"version_value": "< 1.26.7"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-x278-4w4x-r7ch",
"refsource": "MISC",
"name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-x278-4w4x-r7ch"
},
{
"url": "https://github.com/envoyproxy/envoy/commit/71eeee8f0f0132f39e402b0ee23b361ee2f4e645",
"refsource": "MISC",
"name": "https://github.com/envoyproxy/envoy/commit/71eeee8f0f0132f39e402b0ee23b361ee2f4e645"
}
]
},
"source": {
"advisory": "GHSA-x278-4w4x-r7ch",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
2024-01-15 16:00:40 +00:00
}
]
}
}