CVE-2020-25017 (High) detected in envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156, envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156 #9
Labels
security vulnerability
Security vulnerability detected by WhiteSource
CVE-2020-25017 - High Severity Vulnerability
Vulnerable Libraries - envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156, envoy-wasmae02dc6bdd5c5ea61c3869395d81689e34988156
Vulnerability Details
Envoy through 1.15.0 only considers the first value when multiple header values are present for some HTTP headers. Envoy’s setCopy() header map API does not replace all existing occurences of a non-inline header.
Publish Date: 2020-10-01
URL: CVE-2020-25017
CVSS 3 Score Details (8.3)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-2v25-cjjq-5f4w
Release Date: 2020-08-30
Fix Resolution: 1.12.7, 1.13.5, 1.14.5, 1.15.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: