Miggo Logo

CVE-2021-39206:
Incorrect Authorization with specially crafted requests

8.6

CVSS Score
3.1

Basic Information

EPSS Score
0.37991%
Published
9/10/2021
Updated
2/1/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/pomerium/pomeriumgo>= 0.11.0, < 0.14.80.14.8
github.com/pomerium/pomeriumgo= 0.15.00.15.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability originates from Envoy's core functionality that Pomerium depends on, not from Pomerium's own codebase. The CVE-2021-32777 and CVE-2021-32779 vulnerabilities exist in Envoy's handling of HTTP headers and URI fragments, specifically in functions related to the ext-authz extension and path normalization logic. However, the provided data does not include Pomerium-specific code or functions that directly implement these flawed behaviors. The vulnerability is mitigated by updating the embedded Envoy binary, not by modifying Pomerium's source code. Thus, no vulnerable functions within the pomerium/pomerium package itself can be identified with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*nvoy, w*i** Pom*rium is **s** on, *ont*ins two *ut*oriz*tion r*l*t** vuln*r**iliti*s: - [*V*-****-*****](*ttps://*v*.mitr*.or*/**i-*in/*v*n*m*.**i?n*m*=*V*-****-*****): in*orr**tly tr*ns*orm * URL *ont*inin* * `#*r**m*nt` *l*m*nt, **usin* * mism*t*

Reasoning

T** vuln*r**ility ori*in*t*s *rom *nvoy's *or* *un*tion*lity t**t Pom*rium **p*n*s on, not *rom Pom*rium's own *o****s*. T** *V*-****-***** *n* *V*-****-***** vuln*r**iliti*s *xist in *nvoy's **n*lin* o* `*TTP` *****rs *n* URI *r**m*nts, sp**i*i**lly