Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1449 | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2. |
Github GHSA |
GHSA-2h44-x2wx-49f4 | Potential HTTP policy bypass when using header rules in Cilium |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-16T19:15:24.959Z
Reserved: 2023-04-18T16:13:15.881Z
Link: CVE-2023-30851
Updated: 2024-08-02T14:37:15.467Z
Status : Modified
Published: 2023-05-25T18:15:10.240
Modified: 2024-11-21T08:00:58.323
Link: CVE-2023-30851
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA