Upstream information
Description
Envoy before 1.16.1 logs an incorrect downstream address because it considers only the directly connected peer, not the information in the proxy protocol header. This affects situations with tcp-proxy as the network filter (not HTTP filters).SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 5.8 |
Vector | AV:A/AC:L/Au:N/C:P/I:P/A:P |
Access Vector | Adjacent Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 8.8 | 6.5 |
Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
Attack Vector | Adjacent Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | None | None |
Scope | Unchanged | Unchanged |
Confidentiality Impact | High | None |
Integrity Impact | High | Low |
Availability Impact | High | Low |
CVSSv3 Version | 3.1 | 3.1 |
SUSE Timeline for this CVE
CVE page created: Tue Dec 15 10:12:45 2020CVE page last modified: Wed Oct 26 22:49:20 2022