CVE | CVE-2023-30851 |
CVE Title | |
Published Date | 2023-05-25T18:15Z |
Modified Date | 2023-05-26T12:44Z |
Description | Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2. |
References | |
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites. | |
Reference URL | https://github.com/cilium/cilium/releases/tag/v1.13.2 |
Reference Description | MISC https://github.com/cilium/cilium/releases/tag/v1.13.2 |
Reference URL | https://github.com/cilium/cilium/releases/tag/v1.11.16 |
Reference Description | MISC https://github.com/cilium/cilium/releases/tag/v1.11.16 |
Reference URL | https://github.com/cilium/cilium/releases/tag/v1.12.9 |
Reference Description | MISC https://github.com/cilium/cilium/releases/tag/v1.12.9 |
Reference URL | https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4 |
Reference Description | MISC https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4 |
Sources | NIST MITRE |
Note
- No CVSS data for this CVE