Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the Lua filter is vulnerable to denial of service. Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes.
As of versions versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy no longer invokes the Lua coroutine if the filter has been reset. As a workaround for those whose Lua filter is buffering all requests/ responses, mitigate by using the buffer filter to avoid triggering the local reply in the Lua filter.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 | Exploit Vendor Advisory | 
| https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 | Exploit Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 07:53
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.8 | 
| References | () https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 - Exploit, Vendor Advisory | 
07 Nov 2023, 04:09
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the Lua filter is vulnerable to denial of service. Attackers can send large request bodies for routes that have Lua filter enabled and trigger crashes. As of versions versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, Envoy no longer invokes the Lua coroutine if the filter has been reset. As a workaround for those whose Lua filter is buffering all requests/ responses, mitigate by using the buffer filter to avoid triggering the local reply in the Lua filter. | 
11 Apr 2023, 14:43
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Envoyproxy envoy Envoyproxy | |
| CPE | cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 6.5 | 
| References | (MISC) https://github.com/envoyproxy/envoy/security/advisories/GHSA-wpc2-2jp6-ppg2 - Exploit, Vendor Advisory | 
04 Apr 2023, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-04-04 19:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-27492
Mitre link : CVE-2023-27492
CVE.ORG link : CVE-2023-27492
JSON object : View
Products Affected
                envoyproxy
- envoy
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
