跳转到帖子

Amazon Linux AMI 2: CVE-2023-27496: Security patch for ecs-service-connect-agent (ALASECS-2023-003)

recommended_posts

发布于
  • Members

Amazon Linux AMI 2: CVE-2023-27496: Security patch for ecs-service-connect-agent (ALASECS-2023-003)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
04/04/2023
Created
07/14/2023
Added
07/14/2023
Modified
01/28/2025

Description

Envoy is an open source edge and service proxy designed for cloud-native applications. Prior to versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9, the OAuth filter assumes that a `state` query param is present on any response that looks like an OAuth redirect response. Sending it a request with the URI path equivalent to the redirect path, without the `state` parameter, will lead to abnormal termination of Envoy process. Versions 1.26.0, 1.25.3, 1.24.4, 1.23.6, and 1.22.9 contain a patch. The issue can also be mitigated by locking down OAuth traffic, disabling the filter, or by filtering traffic before it reaches the OAuth filter (e.g. via a lua script).

Solution(s)

  • amazon-linux-ami-2-upgrade-ecs-service-connect-agent
  • amazon-linux-ami-2-upgrade-ecs-service-connect-agent-debuginfo

References

  • https://attackerkb.com/topics/cve-2023-27496
  • AL2/ALASECS-2023-003
  • CVE - 2023-27496
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…