Announcing fix for zero day

Skip to first unread message

Asra Ali

Feb 26, 2021, 9:45:46 AM2/26/21

We are announcing a fix for a zero day that was identified on 2021/02/24 in the open:

Envoy JWT filter bypass when using the allow_missing configuration under `requires_any`. If a JWT token is presented with an issuer that does not match the issuer field specified in JwtProvider, then the request is mistakenly accepted. This is due to a bug where `JwtUnknownIssuer` is mistakenly converted to `JwtMissing` and accepted due to `allow_missing`.

This issue affects release 1.17. It does not affect release 1.16 or earlier.

A few notes about the release:

  1. The backport is completed for v.1.17.1. The release has been tagged and is available here

  2. The bug does not apply to any other stable versions. It was introduced in PR 14414 on 2021/01/05.

  3. We will provide more complete write-ups, CVE numbers, etc. later this week.

Envoy Security Team

Reply all
Reply to author
0 new messages