Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS05d21jLXJnNGgtMjh3ds4AA2gR
github.com/kumahq/kuma affected by CVE-2023-44487
Impact
Envoy and Go HTTP/2 protocol stack is vulnerable to the "Rapid Reset" class of exploits, which send a sequence of HEADERS frames optionally followed by RST_STREAM frames.
This can be exercised if you use the builtin gateway and receive untrusted http2 traffic.
Patches
https://github.com/kumahq/kuma/pull/8023
https://github.com/kumahq/kuma/pull/8001
https://github.com/kumahq/kuma/pull/8034
Workarounds
Disable http2 on the gateway listener with a MeshProxyPatch or ProxyTemplate.
References
https://github.com/advisories/GHSA-qppj-fm5r-hxr3
https://github.com/golang/go/issues/63417
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jhv4-f7mr-xx76
https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/?sf269548684=1
https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS05d21jLXJnNGgtMjh3ds4AA2gR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 year ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Identifiers: GHSA-9wmc-rg4h-28wv
References:
- https://github.com/kumahq/kuma/security/advisories/GHSA-9wmc-rg4h-28wv
- https://github.com/kumahq/kuma/pull/8001
- https://github.com/kumahq/kuma/pull/8023
- https://github.com/kumahq/kuma/pull/8034
- https://github.com/envoyproxy/envoy/security/advisories/GHSA-jhv4-f7mr-xx76
- https://github.com/golang/go/issues/63417
- https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack
- https://github.com/advisories/GHSA-qppj-fm5r-hxr3
- https://www.envoyproxy.io/docs/envoy/latest/configuration/best_practices/edge
- https://www.nginx.com/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products/?sf269548684=1
- https://github.com/advisories/GHSA-9wmc-rg4h-28wv
Blast Radius: 5.8
Affected Packages
go:github.com/kumahq/kuma
Dependent packages: 1Dependent repositories: 6
Downloads:
Affected Version Ranges: < 2.0.8, >= 2.1.0, < 2.1.8, >= 2.2.0, < 2.2.4, >= 2.3.0, < 2.3.3, >= 2.4.0, < 2.4.3
Fixed in: 2.0.8, 2.1.8, 2.2.4, 2.3.3, 2.4.3
All affected versions: 1.2.1, 1.8.1
All unaffected versions: