You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
See doc/triage.md for instructions on how to triage this report.
modules:
- module: istio.io/istio
versions:
- introduced: TODO (earliest fixed "1.11.1", vuln range "= 1.11.0")
packages:
- package: istio.io/istio
- module: istio.io/istio
versions:
- introduced: 1.10.0
fixed: 1.10.4
packages:
- package: istio.io/istio
- module: istio.io/istio
versions:
- fixed: 1.9.8
packages:
- package: istio.io/istio
description: "### Impact\nIstio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain
a remotely exploitable vulnerability where an HTTP request with `#fragment` in
the path may bypass Istio’s URI path based authorization policies. \n\n### Patches\n*
Istio 1.11.1 and above\n* Istio 1.10.4 and above\n* Istio 1.9.8 and above\n\n###
Workarounds\nA Lua filter may be written to normalize the path. This is similar
to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization)
guide.\n\n### References\nMore details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008)\n\n###
For more information\nIf you have any questions or comments about this advisory,
please email us at [email protected]\n"
cves:
- CVE-2021-39156
ghsas:
- GHSA-hqxw-mm44-gc4r
The text was updated successfully, but these errors were encountered:
In GitHub Security Advisory GHSA-hqxw-mm44-gc4r, there is a vulnerability in the following Go packages or modules:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: