Announcing fix for zero day

909 views
Skip to first unread message

Asra Ali

unread,
Feb 26, 2021, 9:45:46 AMFeb 26
to envoy-secur...@googlegroups.com
Hi, 

We are announcing a fix for a zero day that was identified on 2021/02/24 in the open:


Envoy JWT filter bypass when using the allow_missing configuration under `requires_any`. If a JWT token is presented with an issuer that does not match the issuer field specified in JwtProvider, then the request is mistakenly accepted. This is due to a bug where `JwtUnknownIssuer` is mistakenly converted to `JwtMissing` and accepted due to `allow_missing`.


This issue affects release 1.17. It does not affect release 1.16 or earlier.


A few notes about the release:

  1. The backport is completed for v.1.17.1. The release has been tagged and is available here

  2. The bug does not apply to any other stable versions. It was introduced in PR 14414 on 2021/01/05.

  3. We will provide more complete write-ups, CVE numbers, etc. later this week.


Thanks,
Envoy Security Team

Reply all
Reply to author
Forward
0 new messages