You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: TODO
versions:
- introduced: TODO (earliest fixed "0.15.1", vuln range "= 0.15.0")
packages:
- package: github.com/pomerium/pomerium
- module: TODO
versions:
- introduced: 0.11.0
fixed: 0.14.8
packages:
- package: github.com/pomerium/pomerium
description: |
Envoy, which Pomerium is based on, contains two authorization related vulnerabilities:
- [CVE-2021-32777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32779): incorrectly transform a URL containing a `#fragment` element, causing a mismatch in path-prefix based authorization decisions.
- [CVE-2021-32779](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32777): incorrectly handle duplicate headers, dropping all but the last. This may lead to incorrect routing or authorization policy decisions.
### Impact
With specially crafted requests, incorrect authorization or routing decisions may be made by Pomerium.
### Patches
Pomerium v0.14.8 and v0.15.1 contain an upgraded envoy binary with these vulnerabilities patched.
### Workarounds
- This issue can only be triggered when using path prefix based policy. Removing any such policies should provide mitigation.
### References
[envoy GSA CVE-2021-32777](https://github.com/envoyproxy/envoy/security/advisories/GHSA-r222-74fw-jqr9)
[envoy GSA CVE-2021-32779](https://github.com/envoyproxy/envoy/security/advisories/GHSA-6g4j-5vrw-2m8h)
[envoy announcement](https://groups.google.com/g/envoy-announce/c/5xBpsEZZDfE/m/wD05NZBbAgAJ)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pomerium/pomerium](https://github.com/pomerium/pomerium/issues)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
cves:
- CVE-2021-39206
ghsas:
- GHSA-cfc2-wjcm-c8fm
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-cfc2-wjcm-c8fm, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: