Cilium is a networking, observability, and security solution with an eBPF-based dataplane. This issue only impacts users who have a HTTP policy that applies to multiple `toEndpoints` AND have an allow-all rule in place that affects only one of those endpoints. In such cases, a wildcard rule will be appended to the set of HTTP rules, which could cause bypass of HTTP policies. This issue has been patched in Cilium 1.11.16, 1.12.9, and 1.13.2.
References
| Link | Resource |
|---|---|
| https://github.com/cilium/cilium/releases/tag/v1.11.16 | Release Notes |
| https://github.com/cilium/cilium/releases/tag/v1.12.9 | Release Notes |
| https://github.com/cilium/cilium/releases/tag/v1.13.2 | Release Notes |
| https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4 | Vendor Advisory |
| https://github.com/cilium/cilium/releases/tag/v1.11.16 | Release Notes |
| https://github.com/cilium/cilium/releases/tag/v1.12.9 | Release Notes |
| https://github.com/cilium/cilium/releases/tag/v1.13.2 | Release Notes |
| https://github.com/cilium/cilium/security/advisories/GHSA-2h44-x2wx-49f4 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-05-25 18:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30851
Mitre link : CVE-2023-30851
CVE.ORG link : CVE-2023-30851
JSON object : View
Products Affected
cilium
- cilium
CWE
