BIT-cilium-proxy-2023-30851

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/cilium-proxy/BIT-cilium-proxy-2023-30851.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-cilium-proxy-2023-30851
Aliases
Published
2024-07-01T11:12:50.500Z
Modified
2024-09-11T06:13:44.893375Z
Summary
[none]
Details

Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple toEndpoints AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.

Database specific
{
    "cpes": [
        "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / cilium-proxy

Package

Name
cilium-proxy
Purl
pkg:bitnami/cilium-proxy

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.11.16
Introduced
1.12.0
Fixed
1.12.9
Introduced
1.13.0
Fixed
1.13.2