A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy.
Metrics
Affected Vendors & Products
References
History
Tue, 28 Jan 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 28 Jan 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access | Envoyproxy: openshift service mesh envoy http header sanitization bypass leading to dos and unauthorized access |
First Time appeared |
Redhat
Redhat service Mesh |
|
CPEs | cpe:/a:redhat:service_mesh:2 | |
Vendors & Products |
Redhat
Redhat service Mesh |
|
References |
|
Tue, 28 Jan 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy. | |
Title | envoyproxy: OpenShift Service Mesh Envoy HTTP Header Sanitization Bypass Leading to DoS and Unauthorized Access | |
Weaknesses | CWE-444 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-01-28T09:29:33.073Z
Updated: 2025-03-12T01:54:23.727Z
Reserved: 2025-01-27T14:16:01.506Z
Link: CVE-2025-0752

Updated: 2025-01-28T14:35:20.372Z

Status : Received
Published: 2025-01-28T10:15:09.493
Modified: 2025-01-28T10:15:09.493
Link: CVE-2025-0752
