We found results for “”
CVE-2023-30851
Good to know:
Date: May 25, 2023
Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple "toEndpoints" AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
Language: Go
Severity Score
Related Resources (7)
Severity Score
Weakness Type (CWE)
Protection Mechanism Failure
CWE-693Insufficient Information
NVD-CWE-noinfoTop Fix
Upgrade Version
Upgrade to version github.com/cilium/cilium - v1.11.16;github.com/cilium/cilium - v1.12.9;github.com/cilium/cilium - v1.13.2
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | ADJACENT_NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | HIGH |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


