From 3eab1da1cc7c44b1521dc15f55113e2e8192ee5c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 24 Aug 2021 21:00:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/32xxx/CVE-2021-32778.json | 12 ++++++------ 2021/32xxx/CVE-2021-32779.json | 12 ++++++------ 2021/32xxx/CVE-2021-32780.json | 10 +++++----- 2021/32xxx/CVE-2021-32781.json | 10 +++++----- 2021/40xxx/CVE-2021-40081.json | 18 ++++++++++++++++++ 2021/40xxx/CVE-2021-40082.json | 18 ++++++++++++++++++ 6 files changed, 58 insertions(+), 22 deletions(-) create mode 100644 2021/40xxx/CVE-2021-40081.json create mode 100644 2021/40xxx/CVE-2021-40082.json diff --git a/2021/32xxx/CVE-2021-32778.json b/2021/32xxx/CVE-2021-32778.json index a36db3ee563..2c24f3a2349 100644 --- a/2021/32xxx/CVE-2021-32778.json +++ b/2021/32xxx/CVE-2021-32778.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy’s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100." + "value": "Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy\u2019s procedure for resetting a HTTP/2 stream has O(N^2) complexity, leading to high CPU utilization when a large number of streams are reset. Deployments are susceptible to Denial of Service when Envoy is configured with high limit on H/2 concurrent streams. An attacker wishing to exploit this vulnerability would require a client opening and closing a large number of H/2 streams. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to reduce time complexity of resetting HTTP/2 streams. As a workaround users may limit the number of simultaneous HTTP/2 dreams for upstream and downstream peers to a low number, i.e. 100." } ] }, @@ -78,15 +78,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", - "refsource": "CONFIRM", - "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc" - }, { "name": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history", "refsource": "MISC", "url": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history" + }, + { + "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc", + "refsource": "CONFIRM", + "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3xh3-33v5-chcc" } ] }, diff --git a/2021/32xxx/CVE-2021-32779.json b/2021/32xxx/CVE-2021-32779.json index 581176e5d4e..e485a50765f 100644 --- a/2021/32xxx/CVE-2021-32779.json +++ b/2021/32xxx/CVE-2021-32779.json @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final \"/admin\" path element, or is using a negative assertion with final path element of \"/admin\". The client sends request to \"/app1/admin#foo\". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as \"/admin#foo\" and mismatches with the configured \"/admin\" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offending \"#foo\" fragment which\nviolates RFC3986 or with the nonsensical \"%23foo\" text appended. A specifically constructed request with URI containing '#fragment' element delivered by an untrusted client in the presence of path based request authorization resulting in escalation of Privileges when path based request authorization extensions. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes that removes fragment from URI path in incoming requests." + "value": "Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final \"/admin\" path element, or is using a negative assertion with final path element of \"/admin\". The client sends request to \"/app1/admin#foo\". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as \"/admin#foo\" and mismatches with the configured \"/admin\" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offending \"#foo\" fragment which violates RFC3986 or with the nonsensical \"%23foo\" text appended. A specifically constructed request with URI containing '#fragment' element delivered by an untrusted client in the presence of path based request authorization resulting in escalation of Privileges when path based request authorization extensions. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes that removes fragment from URI path in incoming requests." } ] }, @@ -86,15 +86,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", - "refsource": "CONFIRM", - "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9" - }, { "name": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history", "refsource": "MISC", "url": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history" + }, + { + "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9", + "refsource": "CONFIRM", + "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9" } ] }, diff --git a/2021/32xxx/CVE-2021-32780.json b/2021/32xxx/CVE-2021-32780.json index c4c9ac0ca76..85bbb6610a4 100644 --- a/2021/32xxx/CVE-2021-32780.json +++ b/2021/32xxx/CVE-2021-32780.json @@ -72,15 +72,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", - "refsource": "CONFIRM", - "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8" - }, { "name": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history", "refsource": "MISC", "url": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history" + }, + { + "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8", + "refsource": "CONFIRM", + "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j374-mjrw-vvp8" } ] }, diff --git a/2021/32xxx/CVE-2021-32781.json b/2021/32xxx/CVE-2021-32781.json index 5fe87f44464..73d368a39f8 100644 --- a/2021/32xxx/CVE-2021-32781.json +++ b/2021/32xxx/CVE-2021-32781.json @@ -78,15 +78,15 @@ }, "references": { "reference_data": [ - { - "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv", - "refsource": "CONFIRM", - "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv" - }, { "name": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history", "refsource": "MISC", "url": "https://www.envoyproxy.io/docs/envoy/v1.19.0/version_history/version_history" + }, + { + "name": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv", + "refsource": "CONFIRM", + "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-5vhv-gp9v-42qv" } ] }, diff --git a/2021/40xxx/CVE-2021-40081.json b/2021/40xxx/CVE-2021-40081.json new file mode 100644 index 00000000000..26bd47f8181 --- /dev/null +++ b/2021/40xxx/CVE-2021-40081.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40081", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/40xxx/CVE-2021-40082.json b/2021/40xxx/CVE-2021-40082.json new file mode 100644 index 00000000000..ee1d3de8406 --- /dev/null +++ b/2021/40xxx/CVE-2021-40082.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-40082", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file